Half of organizations targets of cyberattack in last year

About half of global organizations have suffered a cyberattack in the last year, said a report released on Tuesday by the Information Security Media Group and Bit9.Ã'Â

Almost two-thirds of the organizations that acknowledged they'd been attacked (65 percent) said the events resulted in business disruptions -- employee or system downtime. And 19 percent lost data to a cyber assault, said the report.

However, most alarming is that of the 47 percent of about 250 IT security decision makers participating in the poll who noted their organizations had been attacked, 13 percent confessed that they did not even know if they'd been targeted or not.

"That's shocking," cybersecurity software maker Bit9's CSO, Nick Levay, told CSOonline. "I was expecting that to be a single-digit number and low single-digit number at that."

"In my experience, everybody has experienced a steady stream of attacks," he said. "Even if you're not experiencing targeted attacks, if you have people browsing the Web you're getting hit with Java exploits, Blackhole exploits and what not coming through advertisements and such."

"It made me think that many organizations are not doing an adequate job tracking metrics having to do with security," Levay added.

Fred Kost, head of product marketing at Check Point, said thatÃ'Â while the number of organizations without a clue about cyberattacks on their systems may be shocking, it isn't surprising.

"Attackers today are very clever," Kost said in an interview. "They try to obfuscate their attacks. It's getting harder for organizations to know what's happening."

The researchers also discovered that 70 percent of the respondents -- 62 percent of them from organizations located in the United States -- believed that they were most vulnerable to cyberattack at user endpoints -- PCs, laptops and desktops.

"There is a huge blind spot when it comes to server and end point visibility," Bit9's Levay said.

It's a blind spot, however, that is drawing attention from system defenders. "Most companies now are going to target and secure their endpoints as a priority," Paul Wahlen, director of engineering at Promisec, said in an interview.

"In the past, enterprises have concentrated on firewalls, gateway protection -- the candy bar defense: crunchy on the outside, soft on the inside," Wahlen said. "Now enterprises are focused on looking at endpoints."

[Also see: Largest banks under constant cyberattack, feds say]

While a large majority of the respondents were confident about protecting their servers and endpoints from signature-based attacks, two-thirds of them (66 percent) rated their defenses against non-signature-based forays as average or non-existent.

"Relying on signature-based solutions on the endpoint leaves major gaps," said Meghan Risica, senior product marketing manager at RSA.

"They can only detect what is known," she continued. "For the unknown, never-before-seen malware, organizations need to take a new approach, leveraging live memory analysis and host behavior inspection, to detect threats faster."

The study unearthed some good news in their findings for security administrators. Nearly all the respondents (98 percent) said their budgets funded security at current levels or more in 2014.

Security budgets are being helped by greater awareness of the value of protecting a business's information resources.

"Security is moving up in organizations," Check Point's Kost said. "It's no longer the firewall and network administrator worried about security. There areÃ'Â higher levels in the organization starting to think about this. And that's starting to happen at a lot of businesses, not just the Fortune 100."

Top funding priorities cited by the security pros were enhanced detection (45 percent), awareness and training (44 percent), and real-time endpoint or server monitoring (39 percent).

"It's no longer a question of 'Will we be attacked?' but instead 'How quickly can I detect if I've been attacked?'" RSA's Risica osaid. "That detection time is critical. You don't want to figure it out as your crown jewels are going out the door."

Read more about malware/cybercrime in CSOonline's Malware/Cybercrime section.

Join the CSO newsletter!

Error: Please check your email address.

Tags Information Security Media GroupapplicationsData Protection | MalwareBit9legalsoftwaredata protectioncybercrimecyberattacks

More about Check Point Software TechnologiesCSOFredRSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John P. Mello

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts