SBN

5 takeaways from Bitdefender’s 2019 Hacked Off! report

Introduction

What’s the best way to fend off advanced cyberattacks? What keeps information security professionals awake at night? How do they rate their knowledge of cybersecurity issues? These questions and more are answered by Bitdefender’s 2019 Hacked Off! report. 

Bitdefender is a trusted provider of award-winning cybersecurity technology. Last year, Bitdefender released their Hacked Off! report, which explores the attitudes of cybersecurity professionals towards pressure points, weak spots, stress factors, and strategies. The result is an illuminating glimpse at how organizations can best support their cybersecurity teams. 

Here are some of the biggest trends and takeaways from the 2019 report.

1. Breaches are getting harder to detect 

One of the most surprising findings in the Bitdefender report is that detecting cyberattacks may be getting harder than it was in the past. Thirty-six percent of cybersecurity professionals think their companies are facing cyberattacks without realizing it. 

This data casts a new light on information that had previously shown a decrease in the number of organizations victimized by cyberattacks last year. In other words, the lower number of attacks could be attributed to a failure to realize an attack was even taking place, not because the rate of attacks is decreasing. 

This information is concerning and means it’s more important than ever to make sure information security staff have the training they need to quickly and accurately identify breaches. 

2. Training is the key to defending against advanced attacks

Organizations that emphasize training are best at quickly detecting and isolating cyberattacks, according to Bitdefender. This is backed up by data from the 2019 Hacked Off! report, which shows that:

  • 38% of cybersecurity professionals agree that adequate training is the key to defending the company against advanced attacks
  • 72% of respondents said that a lack of knowledge is (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Christine McKenzie. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/VN5gtqMFLbs/