Anonymous and Hacktivist Attacks Keeping IT Security Pros Up at Night

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for results from a cyber security survey conducted by Bit9.

Concerns over hacktivism and targeted state-sponsored attacks are at the top of security professionals’ minds according to a new survey and research report sponsored by Bit9. The 2012 Cyber Security Survey of nearly 2,000 IT security experts set out to gauge the current state of enterprise security and identify the attack methods and cyber criminal groups that keep IT executives up at night.

According to Bit9’s survey, 64 percent of respondents believe their organization will be the target of a cyber attack in the next six months. As to the type of attackers that are most likely to target their organization, “Anonymous/ hacktivists” leads the survey at 61 percent, “cyber criminals” follows and “nation states” rank third, with China ranking as the most likely actor. In addition, the vast majority (74 percent) believe that their endpoint security solutions on their laptops and desktops are not doing enough to protect their companies and intellectual property (IP) from cyber attacks.

“The survey results put a spotlight on an interesting contradiction: on the surface, people are most afraid of embarrassing, highly publicized attacks from hacktivist organizations like Anonymous, but they recognize that the more serious threats come from criminal organizations and nation states,” said Harry Sverdlove, CTO of Bit9.  “Bit9’s survey highlights how the quickly changing cyber criminal landscape is impacting IT professionals worldwide and illustrates what strategies organizations are implementing to protect their core data and intellectual property from cyber security threats.”

More Slideshows:


Battle of the Enterprise-Ready Mobile OS The platforms were each scored on a combination of factors including built-in security, application security, authentication, device wipe, device firewall, virtualization and many others.

Five Web Application Security Myths Many companies fail to make the first step towards security because of misconceptions and security myths.

Five Keys to Creating the Data Center of Tomorrow Five strategic IT moves that will help CIOs push their data center forward.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AVTEST2014Awards0x AV-TEST Identifies the 10 Best Security Products of 2014

AV-TEST recently announced the winners of the AV-TEST AWARDs for 2014. These awards were presented in five categories, including protection, performance, usability, Android security and best repair. ...  More >>

Security58-190x128 Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their first Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. ...  More >>

MenloSecurityMalware0x Five Cyber Attacks that Made CISOs Rethink Security

Security today is based on the premise that one can detect whether something is good or bad. This premise is fundamentally flawed as malware continues to evade even the latest security technologies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date