Cybersecurity Grades Released for Key Industries

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next Cybersecurity Grades Released for Key Industries-9 Next

IT Sector Grade: D-

How did the bad guys get in? Top 3 practices:

  • Malware (31.2 percent)
  • Network Attack (27.4 percent)
  • Social Engineering (9.7 percent)

According to the CyberFacts, these are the top three practices used by cyber criminals to breach IT organizations in the month of June. The top trending practices were malware, consisting of the Blackshades RAT, GameOver Trojan, and a variety of ransomware, and network attacks, consisting of DDoS and DNS amplification.

Traditionally, the complex world of cybersecurity has been left solely to information security professionals to defend the organization's sensitive information and systems. But the recent spate of high-profile data breaches and warnings from regulators has caught the attention of C-level executives and board members. Cybersecurity is no longer just a technical issue, as a breach can have a major impact on the viability of an organization – loss of brand reputation, jobs, customers and partners, and most importantly a negative impact on the bottom line.

Now that execs recognize the need to prioritize cybersecurity, where do they begin? Understanding the cyber risks an organization faces and extrapolating the potential business impact is tough using traditional cybersecurity solutions, which produce volumes of low-level, machine-based data. This method requires significant effort and resources to understand whether a threat is relevant to the business, how big an impact it could have, and how to address it.

Translating the fire hose of threat data into information that can be easily understood and used to educate the rest of the organization is an approach taken by SurfWatch Labs, a provider of cyber risk intelligence solutions. Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed. This slideshow contains a high-level view of cyber risk analysis contained in SurfWatch Cyber Risk Reports, which aggregate, standardize and analyze cyber-related information for the top four most active industries.

Jason Polancich, founder and chief architect, SurfWatch Labs, is a serial entrepreneur focused on solving complex Internet security and cyber-defense problems, with more than 20 years of experience as an intelligence analyst, software engineer, systems architect and corporate executive. Prior to founding SurfWatch Labs, Mr. Polancich co-founded Novii Design, which assisted the U.S. intelligence community and Department of Defense in building some of the largest data warehouse and analysis systems ever put into operation within the government and defense contracting sectors.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.