sb-au logo
Story image

DimData: Fear finally setting in amongst vulnerable orgs

16 May 2019

Dimension Data, a global technology integrator and managed services provider for hybrid IT, has revealed exclusive findings from its Executive Guide to NTT Security’s 2019 Global Threat Intelligence Report concerning the cybersecurity maturity of organisations across a number of markets and sectors.

Globally, the average cybersecurity maturity rating stands at a worrying 1.45 out of 5 – a score determined by an organisation’s holistic approach to cybersecurity from a process, metrics and strategic perspective. 

This comes during a time when security vulnerabilities have also surged to a record high (up 12.5% from 2017).

The finance (1.71) and technology (1.66) sectors boast the highest maturity ratings and are continuing to ramp up their security posture, most likely prompted by their unenviable positions as the most commonly targeted industries, each accounting for 17% of all attacks recorded in 2018.

Scouring trillions of logs and billions of attacks, the research also revealed the most common attack types, with web attacks the most prevalent threat, doubling in frequency since 2017 and accounting for 32% of all attacks detected last year. 

Reconnaissance (16%) was the next most common hostile activity, closely followed by service-specific attacks (13%) and brute-force attacks (12%).

“There’s clearly work to be done across all sectors in order to establish more robust security postures. However, it’s reassuring to see many C-suite leaders recognising the importance of making more strategic investments to improve their cybersecurity defences,” says Dimension Data Asia Pacific Cybersecurity solutions director Neville Burdan.

“There have been some exciting developments in the predictive threat intelligence space, with new levels of collaboration and buy-in across the cybersecurity value chain. What’s more, the most-targeted industries are also the most likely to seek assistance to evolve their strategies and build their security programmes. This bodes well for companies looking to reach their desired cyber-maturity state.”

Other highlights from the research include:

  • Globally, 35% of attacks originate from IP addresses within the US and China, followed by EMEA and APAC.
     
  • Cryptojacking represents a significant amount of hostile activity, at times accounting for more detections than all other malware combined, hitting the technology and education sectors hardest.
     
  • Credential theft is up as attackers target cloud credentials, with tech companies (36%), telcos (18%), and business and professional services (14%) significantly impacted by this.
Story image
Secureworks: Remote working exposes new security vulnerabilities
New vulnerabilities have been exposed as IT teams across the world respond to the ongoing COVID-19 pandemic.More
Story image
Zoom to begin rolling out end-to-end encryption
Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May following backlash that the company was lax on its security and privacy.More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
UiPath and eSentire bring hyperautomation to Microsoft Security
UiPath and eSentire have announced a strategic partnership to deliver end-to-end security policy automation across multiple Microsoft Security services.More
Story image
The intelligent workspace for Australian businesses returning to work
With the right workspace management tools, businesses can easily access information about who is in an office, how long they have been there, and how long they can stay.More