Advertisement

IT teams leave security gaps because they don’t know how they got there

IT teams leave security gaps because they don’t know how they got there
20% of IT managers admitted to not knowing how their most significant attack got in their network, or for how long it was there before it was detected, according to research.

According to Sophos, IT leaders had a higher chance of spotting cyber attacks on their servers and networks than anywhere else.

Which must be the most important question to answer following a cyber attack is where it was targeted. Yet, according to new research from Sophos, the network security firm, 20% of IT managers surveyed are unaware of how their most significant cyber attack entered their organisations.

The research also found that 17% don’t know how long the threat was in the environment before it was detected.

iot attack
Also see: IoT Devices Always Under Attack

Larger organisations are more likely to know how threats got in than smaller ones. This is likely due both to having more skilled resources and more comprehensive cyber security solutions.

According to Sophos, IT leaders had a higher chance of spotting cyber attacks on their servers and networks than anywhere else and, therefore, they stressed the importance of endpoint detection and response (EDR) technology.

“Servers store financial, employee, proprietary, and other sensitive data, and with stricter laws like GDPR that require organisations to report data breaches, server security stakes are at an all-time high. It makes sense that IT managers are focused on protecting business-critical servers and stopping attackers from getting on the network in the first place and this leads to more cybercriminal detections in these two areas,” said Chester Wisniewski, principal research scientist, Sophos. “However, IT managers can’t ignore endpoints because most cyber attacks start there, yet a higher than expected amount of IT managers still can’t identify how threats are getting into the system and when.”

Advertisement

“If IT managers don’t know the origin or movement of an attack, then they can’t minimise risk and interrupt the attack chain to prevent further infiltration,” said Wisniewski. “EDR helps IT managers identify risk and put a process in place for organisations at both ends of the security maturity model. If IT is more focused on detection, EDR can more quickly find, block and remediate; if IT is still building up a security foundation, EDR is an integral piece that provides much-needed threat intelligence.”

For the research, The 7 Uncomfortable Truths of Endpoint Security, Vanson Bourne survey interviewed 3,100 IT decision makers in 12 countries and across six continents. All respondents were from organizations with between 100 and 5,000 employees.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

back to top

Top Cyber News

Nearly all Europes operators to offer 5G services to sport events’ organisers

Nearly all Europes operators to offer 5G services to sport events’ organisers

13 March, 2019

The study is based on a survey of C-level and other senior decision makers from 60 of the world’s 100 largest operator...

Just under half of A.I. start-ups in Europe have almost nothing to do with A.I., research finds

Just under half of A.I. start-ups in Europe have almost nothing to do with A.I., research finds

05 March, 2019

Nearly half of the companies in Europe that call themselves AI start-ups don't in fact use artificial intelligence, a ne...

Cracking Down on Botnets

Cracking Down on Botnets

15 April, 2019

Although there is no silver bullet solution for mitigating the risk of botnets, there are a number of helpful best pract...

Apple Speaks About Recycling iPhones Via Robot

Apple Speaks About Recycling iPhones Via Robot

19 April, 2019

Apple has spoken about its effort to become even more environmentally friendly, by offering an insight into its normally...

Cryptominers Still Top Threat but Coinhive's Shutdown Could Change That

Cryptominers Still Top Threat but Coinhive's Shutdown Could Change That

12 March, 2019

Coinhive has remained on top of Check Point Software's global threat index for the last 15 months. ...

Telia tracks network data for smarter cities in northern Europe

Telia tracks network data for smarter cities in northern Europe

28 March, 2019

It uses aggregated, anonymised phone data to monitor crowd patterns.

Categories

External Links

About Us

Follow Us