The Impact of Advanced Persistent Threats to Enterprises

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next The Impact of Advanced Persistent Threats to Enterprises-3 Next

A recent Ponemon Institute survey found that most respondents did not have the tools, personnel or funding to determine root causes of a data breach. The top two reasons for failing to prevent a malicious breach were:

  • Lacked in-house expertise – 64 percent of businesses
  • Lacked adequate forensics capabilities – 47 percent of businesses

These attacks cost the business an average of $840,000, as well as lost time, productivity and reputation.

This gap exists because traditional security defenses are designed to detect and block known threats, while remaining largely blind to today’s zero-day threats and novel malware. This is worsened by the tendency for advanced security operations teams, as well as the defenses they employ, to operate in silos with no ability to share information across the entire security organization or environment.  

It’s no secret that IT security threats keep evolving. Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive…and successful. Security breaches still happen at an alarming rate, despite the fact that security technologies and processes keep evolving too. The lack of in-house enterprise expertise highlights an organizational gap that exists between the day-to-day operations team and the advanced security teams that contain and resolve incidents. This gap is worsened by the tendency of traditional advanced threat solutions to operate in a silo – and not share new threat intelligence across the security environment.

Click through to learn the steps organizations can take to address advanced persistent threats, provided by Blue Coat Systems.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.