Eskenzi PR Eskenzi PR
  • About Us
Tuesday, 9 March, 2021
IT Security Guru
Eskenzi PR
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Almost a third of organisations unable to detect intruders on network

by The Gurus
September 2, 2015
in Editor's News
hack
Share on FacebookShare on Twitter

A new survey from Lieberman Software Corporation revealed that 83 percent of IT security professionals are still confident that their perimeter security tools, like firewalls, can react quickly enough to defend against today’s sophisticated cyber attacks. This assumption could ultimately be putting consumer and business data at risk.
The study, which was conducted at Microsoft Ignite in May 2015 and measured the attitudes of nearly 150 IT professionals, also revealed 29 percent of those surveyed do not feel confident that their IT teams would have the ability to detect an intruder attempting to breach their network. However, this could be a result of the tools they are using not having the capability to detect today’s stealthy hackers.
Commenting on the survey findings, Philip Lieberman, CEO of Lieberman Software, said: “Next generation firewalls, intrusion detection systems and the like can be potent deterrents to known dangers. But when it comes to advanced zero day threats and precisely targeted phishing attacks, perimeter security tools are ineffective. Companies still relying on these solutions to protect against today’s advanced cyber attacks should prepare for the consequences.”
Other findings from the study revealed that when an intruder is detected on an organisation’s network the most common mitigation technique is for IT staff to take manual action to stop them carrying out further malicious activity.
“Competent attackers are capable of quiet intrusions and the take-over of existing credentials found on compromised systems,” Lieberman said.  “With that in mind, we recommend regular reboot of systems, discontinuance of the use of domain administrator accounts, regular invalidation of Kerberos tickets to force re-authentication, and the use of very short lifetime credentials for passwords, SSH keys and certificates used for authentication. “
“We also recommend automating privileged identity management and removing humans from the process of service account password changes,” Lieberman continued.  “This reduces the manual burden placed on IT staff and helps overcome automated cyber attacks that nest within environments, hoping to use long lived administrative passwords.”
For more information on the survey, see http://www.liebsoft.com/IT-Professional-Survey/.

0 0 vote
Article Rating
FacebookTweetLinkedIn
Tags: Cyber Attackdata breachfirewallsinformation securityinfosecintrusion detectionit securityLiebermanLieberman Softwarenetwork securityPhishingphishing attack
ShareTweetShare
Previous Post

When is SaaS right for your business?

Next Post

UK population battles with “Privacy Paralysis” as consumers feel overwhelmed by risks to online identity and data

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

International Women’s Day: the road towards equality is still long for the cybersecurity industry

March 8, 2021
Malaysia Airlines

Malaysia and Singapore Airlines Breached in Third Party Hacks

March 5, 2021
Fraud attempts skyrocketed in 2020 according to latest Financial Crime Report from Feedzai

Fraud attempts skyrocketed in 2020 according to latest Financial Crime Report from Feedzai

March 4, 2021

Top 10 awards to enter for cybersecurity 

March 3, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept