Cybersecurity Grades Released for Key Industries

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next Cybersecurity Grades Released for Key Industries-6 Next

Consumer Goods Sector Grade: C+

How did the bad guys get in? Top 3 practices:

  • Unauthorized access (34 percent)
  • Network Attack (23.5 percent)
  • Malware (21.9 percent)

According to the CyberFacts, these are the top three practices used by cyber criminals to breach consumer goods organizations in the month of June. While unauthorized access was the largest attack method in June, it was down significantly from the previous month. Network attacks such as DDoS and malware, distributed via malvertising, were the next top methods used by cyber criminals.

Traditionally, the complex world of cybersecurity has been left solely to information security professionals to defend the organization's sensitive information and systems. But the recent spate of high-profile data breaches and warnings from regulators has caught the attention of C-level executives and board members. Cybersecurity is no longer just a technical issue, as a breach can have a major impact on the viability of an organization – loss of brand reputation, jobs, customers and partners, and most importantly a negative impact on the bottom line.

Now that execs recognize the need to prioritize cybersecurity, where do they begin? Understanding the cyber risks an organization faces and extrapolating the potential business impact is tough using traditional cybersecurity solutions, which produce volumes of low-level, machine-based data. This method requires significant effort and resources to understand whether a threat is relevant to the business, how big an impact it could have, and how to address it.

Translating the fire hose of threat data into information that can be easily understood and used to educate the rest of the organization is an approach taken by SurfWatch Labs, a provider of cyber risk intelligence solutions. Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed. This slideshow contains a high-level view of cyber risk analysis contained in SurfWatch Cyber Risk Reports, which aggregate, standardize and analyze cyber-related information for the top four most active industries.

Jason Polancich, founder and chief architect, SurfWatch Labs, is a serial entrepreneur focused on solving complex Internet security and cyber-defense problems, with more than 20 years of experience as an intelligence analyst, software engineer, systems architect and corporate executive. Prior to founding SurfWatch Labs, Mr. Polancich co-founded Novii Design, which assisted the U.S. intelligence community and Department of Defense in building some of the largest data warehouse and analysis systems ever put into operation within the government and defense contracting sectors.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.