The digital world consists of the widespread use of mobile devices that cybercriminals are able to access through platforms, social networks, and the public cloud.
Organizations in particular need to protect against multi-faceted ‘advanced persistent threats’ (APTs – also known as ‘advanced targeted attacks, or ATAs).
The key attributes are: the use of social engineering (such as spear phishing) to gain initial entry to a target organization’s network and execute a zero-day attack; the acquisition of privileges to further penetrate the target network; the establishment of communication links with external ‘command and control’ (C&C) servers; the theft or compromise of assets; and the covering of tracks after completing the mission.
Cost of a CyberattackThe Ponemon Institute’s 2013 survey has found that the average annul cost of cybercrime is $7.2 million per organization.
This represents a 30% increase from the year before. The United States takes the greatest hit out of all countries surveyed.
Denial of Services (DoS) attacks account for the highest percentage of costs in both smaller(16%) and larger (22%) companies.
Attacks like viruses, worms and trojans, and phishing and social engineering (both 1.7x more prevalent in smaller organizations), malware (2.5x) and botnets (2.7x).
The larger companies are hit the hardest by Dos, and malicious insiders attacks.
The survey shows the average number of days that it takes to resolve the cyberattack ranges from 2.6 days for viruses, worms and trojans up to 53 days for malicious insider attacks:
To view more Internet Security full reports:
- Symantec – Internet Security Threat Report 2013
- Trustwave – 2013 Trustwave Gloval Security Report
- PwC – 2013 Information Security Breaches Survey
Hyphenet can help you find the right type of cyberdefence for your company. Rackmount appliances, cloud-based services and threat defense are all precautions you can take to protect your business and keep the bad guys out.
Call us today! 619-325-0990
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.
IT Security and Risk Management: An overview