Eskenzi PR Eskenzi PR
  • About Us
Friday, 23 April, 2021
IT Security Guru
Eskenzi PR
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Phishing tops list of most prevalent security threats facing organisations globally

by The Gurus
August 11, 2017
in Editor's News
phishing
Share on FacebookShare on Twitter

Results of SANS Institute 2017 Threat Landscape survey paints users and endpoints as primary targets, and part of the solution

Security professionals rated phishing (72%), spyware (50%) and ransomware (49%) as top threats

 37% of security professionals indicated that calls to the help desk enabled them to discover their most impactful threats

 
According to results of a new survey on today’s threat landscape, to be released by SANS Institute on Tuesday 15 August, both users and their endpoint devices are the primary target for cyber criminals in 21st century security battles.
The survey questioned security and IT professionals globally on the threats their organisations face today. Phishing (72%), spyware (50%), ransomware (49%) and Trojans (47%) were named the threats most seen by respondents’ organisations, demonstrating how cyber criminals continue to target individual employees within businesses to gain access to sensitive information. When it comes to impact, phishing causes the most damage, and 40% of survey respondents experienced phishing attacks, including spearphishing and whaling in the last year.
“Users and their endpoints are still in the cross hairs,” says Lee Neely, SANS Analyst, Mentor Instructor and author of the survey report. “Traditional and malware-less threats keep popping up at every corner, making our jobs as defenders resemble an ongoing game of Whack-a-Mole to keep them at bay.”
Malware-less threats are ever-present; almost one-third of respondents have experienced a malware-less threat entering their organisation, impacting IT systems and adding to IT staff workload. These attacks are more difficult to find because they can’t be detected by signature-based technologies. Scripting attacks were the most common malware-less incident, while credential compromise or privilege escalation caused the most impact.
Few of the threats were new zero-day threats, on the other hand, with 76% of security professionals admitting that under 10% of the significant threats they saw were zero-day.
“Today’s threats predominately leverage the same old vulnerabilities and techniques,” added Neely. “The time is ripe to change our protections as well as remediation processes to stem the tide of successful threat vectors.”
But it’s not all doom and gloom. While users are the primary target of these attacks, it’s the users themselves that are also part of the solution. In the survey, 37% of respondents indicated that calls to the help desk helped them discover the most impactful threats. User training, improved operational security practices and improved visibility into network and endpoint behavior were all cited as the top measures to improve threat prevention success.
The full results of the 2017 Threat Landscape survey will be shared during a webcast on Tuesday, August 15 at 1 PM EDT, sponsored by Cylance, FireEye, McAfee, and Qualys, and hosted by SANS. Register to attend the webcast at www.sans.org/u/uGU
Those who register for the webcast will also receive access to the published results paper developed by SANS Analyst and network security expert, Lee Neely.

0 0 vote
Article Rating
FacebookTweetLinkedIn
Tags: cybersecurityITPhishingRansomwaresecuritytechThreat
ShareTweetShare
Previous Post

Android app stores flooded with 1,000 spyware apps

Next Post

Attacking critical infrastructure – the evolution of kinetic warfare

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

messaging apps - signal

Signal CEO hacks mobile-hacking firm

April 22, 2021
New UK laws to protect IoT devices amid sales surge

New UK laws to protect IoT devices amid sales surge

April 22, 2021
edgescan logo

PRODUCT REVIEW – Edgescan makes fullstack vulnerability management easy

April 21, 2021
The clubhouse app

Armis and UK’s Eseye partner to secure connected devices on any cellular network

April 20, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept