Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 22 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

A massive 50% of critical flaws in enterprise environments due to outdated or unsupported components, more than doubling last year

Organisations in the education sector found to contain the highest number of critical flaws

by Sabina
January 29, 2020
in News, Press Releases, Uncategorized
Bulletproof Loro
Share on FacebookShare on Twitter

Bulletproof has released its Annual Cybersecurity Industry Report that shows that half of the most pervasive of critical flaws – which offer hackers an easy route into an organisation – are down to outdated components, such as unpatched or unsupported software. However, this number has jumped significantly from 22%  over the previous year, indicating a widespread negligence when it comes to organisations’ cybersecurity practices.

One of the most shocking findings was that cyber criminals continue to evolve their techniques and are more ready than ever to jump on the opportunity of an attack. In fact, a proof of concept experiment run by Bulletproof researchers showed that services are discovered and attacked by cyber criminals within 32 milliseconds of going live.

Other Key stats include: 

  • 1 in 5 penetration tests revealed a critical risk in need of immediate remediation
  • The number of medium risks outnumber the low-risk issues
  • Over half of security events relate to user activity
  • The education sector contained the highest number of critical flaws
  • AI voice technology was used in successful CEO fraud, confirming a prediction Bulletproof made last year
  • 68% of malicious IPs encountered this year were known, bad actors
  • Privacy and security by design are not being followed

Oliver Pinson-Roxburgh, co-founder of Bulletproof, said: “What’s clear from this data is that, although every year we hope for a dramatic improvement in corporate security, we continue to see a lot of the same mistakes being made over and over again. Getting the basics right is critical; and yet, businesses continue to fail to implement security by design, leading to an increased attack surface and unnecessary risks. The importance of threat detection is a priority and is still the best way to keep ahead of the hackers. Too many organisations are operating blind and failing to see the threats, let alone prevent them.

“Overall, the report highlights a need for enterprises to bolster the foundations of their security controls, over and above what compliance prescribes, and need to step up their game when it comes to detecting compromises before it’s too late,” he concluded. 

The report is based on data that Bulletproof’s penetration testing and Security Operations Centre (SOC) teams processed in 2019, which amounted to 15,000 events per second and billions of logs each month.

 

 

 

FacebookTweetLinkedIn
Share1TweetShare
Previous Post

Gatewatcher and Nozomi Networks Team to Deliver Advanced OT and IoT Cybersecurity Solutions for Global industry

Next Post

Social Insurance Numbers targeted by phishing scam

Recent News

security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information