The Impact of Advanced Persistent Threats to Enterprises

1 | 2 | 3 | 4 | 5 | 6 | 7
Next The Impact of Advanced Persistent Threats to Enterprises-3 Next

A recent Ponemon Institute survey found that most respondents did not have the tools, personnel or funding to determine root causes of a data breach. The top two reasons for failing to prevent a malicious breach were:

  • Lacked in-house expertise – 64 percent of businesses
  • Lacked adequate forensics capabilities – 47 percent of businesses

These attacks cost the business an average of $840,000, as well as lost time, productivity and reputation.

This gap exists because traditional security defenses are designed to detect and block known threats, while remaining largely blind to today’s zero-day threats and novel malware. This is worsened by the tendency for advanced security operations teams, as well as the defenses they employ, to operate in silos with no ability to share information across the entire security organization or environment.  

It’s no secret that IT security threats keep evolving. Today’s advanced persistent threats (APTs) are increasingly sophisticated, diverse, targeted, aggressive…and successful. Security breaches still happen at an alarming rate, despite the fact that security technologies and processes keep evolving too. The lack of in-house enterprise expertise highlights an organizational gap that exists between the day-to-day operations team and the advanced security teams that contain and resolve incidents. This gap is worsened by the tendency of traditional advanced threat solutions to operate in a silo – and not share new threat intelligence across the security environment.

Click through to learn the steps organizations can take to address advanced persistent threats, provided by Blue Coat Systems.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.