Business Is Struggling To Combat Hacking

Businesses are struggling to keep up with the threat posed by cyber criminals, according to a new report.

Published January 19th, the 2016 Cisco Annual Security Report (ASR) has shed light on the issues businesses are currently facing when it comes to cyber security.

This report highlights that, while threats to security and risks such as phishing attacks have remained relatively constant since the first ASR was published in 2007, what is really notable is how quickly cyber criminals innovate to take full advantage of any security gaps in new technology.

Also concerning is that they are also making use of older malware to attack out-of-date systems, which are more vulnerable than up-to-date software. 

In a blog announcing the report's release, senior vice-president, chief security and trust officer at Cisco John Stewart said: "Aging infrastructure opens up green-field attack surfaces while uneven or inconsistent security practices remain a challenge."

He also highlighted that attackers are growing "more bold, flexible, and resilient", while companies are struggling to keep up with global digitisation, notably in terms of detection speeds and staff education.
 
Furthermore, a lack of global coordinate defence against cyber attacks was cited as another weak spot in preventing cyber crime. 

"On the global front, we see fluctuations in cyber internet governance across regions, which inhibits collaboration and the ability to respond to attacks," he explained.

Recently, Wi-Fi hotspots have fallen under scrutiny too. The risks they pose were recently highlighted by the Evening Standard, which reported that such hotspots are increasingly at risk of being hit by criminals - something that businesses and individuals alike can fall prey to.

Mr Stewart suggests that, to tackle risks such as those outlined in the ASR, companies need to act now. In addition to greater global coordination, he suggests senior leaders need to do more to embrace cyber security. Furthermore, vendors who embed IT must also commit themselves to producing secure solutions that customers can trust.

Kroll:http://http://bit.ly/1npke6z

 

« CIO Work Report - Executive Brief (£)
Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Cyber News Live

Cyber News Live

Welcome to Cyber News Live (CNL), we are dedicated to keeping everyone safe online. We provide vital information.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.