Subscribe to our newsletter to get the latest scoop right into your inbox.
One-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent. The latest revelations done under Cisco 2017 Annual Cybersecurity report (ACR), surveyed nearly 3,000 chief security officers (CSOs) and security operations leaders from 13 countries in the Security Capabilities Benchmark Study, part of the Cisco ACR.
In its 10th year, the global report highlights challenges and opportunities for security teams to defend against the relentless evolution of cybercrime and shifting attack modes.
Ninety percent of these organizations are improving threat defense technologies and processes after attacks by separating IT and security functions (38 percent), increasing security awareness training for employees (38 percent), and implementing risk mitigation techniques (37 percent).
CSOs cite budget constraints, poor compatibility of systems, and a lack of trained talent as the biggest barriers to advancing their security postures.
Leaders also reveal that their security departments are increasingly complex environments with 65 percent of organizations using from six to more than 50 security products, increasing the potential for security effectiveness gaps.
To exploit these gaps, ACR data shows criminals leading a resurgence of “classic” attack vectors, such as adware and email spam, the latter at levels not seen since 2010. Spam accounts for nearly two-thirds (65 percent) of email with eight to 10 percent cited as malicious. Global spam volume is rising, often spread by large and thriving botnets.
Measuring effectiveness of security practices in the face of these attacks is critical. Cisco tracks progress in reducing “time to detection” (TTD), the window of time between a compromise and the detection of a threat. Faster time to detection is critical to constrain attackers’ operational space and minimize damage from intrusions. Cisco has successfully lowered the TTD from a median of 14 hours in early 2016 to as low as six hours in the last half of the year. This figure is based on opt-in telemetry gathered from Cisco security products deployed worldwide.
The Business Cost of Cyber Threats: Lost Customers, Lost Revenue
The 2017 ACR revealed the potential financial impact of attacks on businesses, from enterprises to SMBs. More than 50 percent of organizations faced public scrutiny after a security breach. Operations and finance systems were the most affected, followed by brand reputation and customer retention.
For organizations that experienced an attack, the effect was substantial:
Hacker Operations and New “Business” Models
In 2016, hacking became more “corporate.” Dynamic changes in the technology landscape, led by digitization, are creating opportunities for cybercriminals. While attackers continue to leverage time-tested techniques, they also employ new approaches that mirror the “middle management” structure of their corporate targets.
Secure the Business, Maintain Vigilance
The 2017 ACR reports that just 56 percent of security alerts are investigated and less than half of legitimate alerts remediated. Defenders, while confident in their tools, battle complexity and manpower challenges, leaving gaps of time and space for attackers to utilize to their advantage. Cisco advises these steps to prevent, detect, and mitigate threats and minimize risk:
“In 2017, cyber is business, and business is cyber –that requires a different conversation, and very different outcomes. Relentless improvement is required and that should be measured via efficacy, cost, and well managed risk. The 2017 Annual Cybersecurity Report demonstrates, and I hope justifies, answers to our struggles on budget, personnel, innovation and architecture,” said John N. Stewart, Senior Vice President and Chief Security and Trust Officer, Cisco.
“One of our key metrics highlighted in the 2017 Annual Cybersecurity Report is the ‘time to detection’ – the time it takes to find and mitigate against malicious activity. We have brought that number down to as low as six hours. A new metric – the ‘time to evolve’ – looked at how quickly threat actors changed their attacks to mask their identity. With these and other measures gleaned from report findings, and working with organizations to automate and integrate their threat defense, we can better help them minimize financial and operational risk and grow their business,” said David Ulevitch, Vice President/General Manager, Security Business, Cisco.
Techmagnifier Group is a vivid one stop online source protracting all the exclusive affairs of the Consumer and Business Technology. We have well accomplished on delivering expert views, reviews, and stories empowering millions with impartial and nonpareil opinions. Technology has become an inexorable part of our daily lifestyle and with Techmagnifier Group expertise, millions of intriguers everyday are finding for itself a crony hangout zone.
Shibu Paul | Regional Director, India, GCC & SEA |Array Networks
Surendra Singh, Country Director, Forcepoint
Vishal Goyal, Senior Manager - Technical Marketing, Analog and MEMS Group, RF, Sensors and A...
Souma Das, Managing Director, Qlik India
Rajesh Shewani, Head, Technology and Solution Architecture, Teradata India
May 29, 2017
Mar 03, 2017
Jul 27, 2017Designed to meet the long lifecycle needs of COTS contractors Artesyn Embedded Technologies launched a powerful new packet processing and high performance server blade, the ATCA-7540, based on dual Intel Xeon Scalable processors (codename Skylake), which were recently announced. Key Nuggets...
Aug 24, 2017The test included Spirent’s quint-speed 100/50/40/25/10G MX3 traffic modules running at 50G speed Spirent Communications announced that Network...
Jul 20, 2017Limelight Networks announces establishment of three new Points-of-Presence (PoPs) in India panning across Bombay, Chennai and Delhi. The new PoPs is...