To better understand the current attack landscape, Cylance commissioned a nationwide survey of over 200 qualified IT cybersecurity mid- and senior-level staff, and queried them about their recent attack history. The resulting data on Infection Scenarios provides rare insights into how large companies across a variety of industries are being targeted by attackers, and how often attackers are successful.
The data represents responses from IT decision makers in the following top five surveyed industries:
- Internet and Technology (22%)
- Manufacturing (14%)
- Healthcare and Pharmaceuticals (10%)
- Retail (9%)
- Financial (8%)
Unsurprisingly, the data shows that attackers are targeting employees, and their endpoints, repeatedly. Across every industry, phishing attacks led all attack instances, with several organizations sharing details on successful attacks. The data also unfortunately indicates that many security solutions in place today are unable to prevent successful attacks, leading to increased and costly downtime.
The Infection Scenarios portion of the survey focused primarily on the following topics:
- Frequency and business impact of successful attacks
- Attack diversity
- Breach/compromise reporting requirements
We invite you to access the complete survey results here; in the meantime, here are a few highlights:
Frequency and Business Impact of a Breach
Organizations have a myriad of security tools in place, many from well-known providers with a long history of delivering security solutions. However, our survey findings paint a dire picture regarding successful attacks. The diversity in attack type coupled with the onslaught of new malware variants released daily means security solutions that rely on signature-based prevention techniques will struggle to prevent a successful attack.
As previously mentioned, phishing attacks were most successful, according to our respondents, but the more disturbing piece of information garnered from the survey is the attack diversity organizations are experiencing. As a decision maker in purchasing a cybersecurity solution, our respondents (Read more...)
This is a Security Bloggers Network syndicated blog post authored by Chad Skipper. Read the original post at: Cylance Blog