Less Than a Quarter of Businesses Are Ready To Resist A Cyberattack

On average, only 23% of organizations are capable of responding effectively to a cyber-incident. This is especially bad for companies in the retail and hospitality sectors, which were the top-attacked verticals in 2015.

That’s the word from NTT Group’s annual Global Threat Intelligence Report, which found that not only do 77% have no capability to respond to critical incidents, but that the addressable fixable issues of social engineering and exploits of old vulnerabilities continue to be popular attack vectors.

In fact, spear phishing attacks accounted for approximately 17% of incident response activities supported in 2015. In many cases, the attacks targeted executives and finance personnel with the intent of tricking them into paying fraudulent invoices.

The bad guys are putting more effort into social engineering too. Activity related to the reconnaissance phase of the Lockheed Martin Cyber Kill Chain (CKC) accounted for nearly 89% of all log volume. These logs accounted for approximately 35% of escalated attack activity, making reconnaissance the largest single element in the CKC.

The report also found that all of the top 10 vulnerabilities targeted by exploit kits during 2015 are related to Adobe Flash. In 2013, the top 10 vulnerabilities targeted by exploit kits included one Flash and eight Java vulnerabilities. That has changed as new Java vulnerabilities have dropped steadily since 2013. The number of publicized Flash vulnerabilities jumped by almost 312% over 2014 levels.

But here’s the kicker: Nearly 21% of vulnerabilities detected in client networks were more than three years old. Results included vulnerabilities from as far back as 1999, making them more than 16 years old.

The retail sector meanwhile experienced the most attacks per client, according to the report, at just fewer than 11%—nearly three times as many attacks as clients in the finance sector. Retailers often process large volumes of personal information—including credit card data—in highly distributed environments with many endpoints and point of service devices. Such diverse environments can be difficult to protect, the report noted.

The hospitality sector faces many of the same challenges as the retail sector, also processing high volumes of sensitive information including credit card data. Transactions in the hospitality sector, that includes hotels and resorts, tend to be sizable, that can make compromising those card numbers more attractive to attackers.

The hospitality sector also includes a significant number of loyalty plans that house even more personal information then insurance, government and manufacturing. While the finance sector showed the highest volume of attacks overall, on a per-client basis, retail clients experienced 2.7 times the number of attacks as finance.

The insurance and government sectors both ranked in the top five most attacked sectors in 2015, and manufacturing continued to detect significant attacks, consistent with levels experienced in previous years. Overall, clients in the top five sectors experienced more than 44% of the attacks observed by NTT Group during 2015.

The report also found that there’s been an 18% rise in malware detected for every industry other than education.

One bright spot: DoS/DDoS attack volume fell 39% from levels observed in 2014. Implementation of better mitigation tools, along with fewer attacks, combined for a drop in detections of denial of service (DoS) and distributed denial of service (DDoS) activities. But, extortion based on the victim’s paying to avoid or stop DDoS attacks became more prevalent.

Infosecurity: http://bit.ly/1WHRTWS

« NSA Has ‘No Idea’ How Many American Citizens It’s Spying On
12% Of Bank CEOs Don’t Even Know If They’ve Been Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Libraesva

Libraesva

Libraesva secures email communications for organisations, helping them eliminate email borne threats, preserve email data and provide an environment for their people to communicate safely.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.