[metaslider id=2951] … Read More
Archives for October 2013
Average cost of cybercrime grows again due to sophisticated attacks
Brandan Blevins, Assistant Site Editor Published: 08 Oct 2013 – Search Security
Sophisticated cyberattacks are hitting enterprises more frequently and attackers are staying on networks undetected for longer periods, contributing to an increase in the average cost of cybercrime for the fourth year in a row, according to a new report.
The fourth-annual Cost of Cybercrime Study, produced by the Ponemon Institute and sponsored by Hewlett-Packard’s enterprise security unit, showed the cost enterprises pay to clean up after a cyberattack has increased 26% from 2012, and has gone up a staggering 78% since the first report was released four years ago.
The latest study analyzed information from 60 large U.S.-based organizations (and 234 in total) in various industry sectors, with the average cost per organization totaling approximately $11.56 million a year.
Instead of focusing on the total cost incurred by enterprises, the Ponemon report narrowed its scope to only include what enterprises spent while responding to cybercrime incidents, including detection, investigation, recovery and incident management.
Larry Ponemon, founder and chairman of the Ponemon Institute, noted that the report doesn’t take into account, as an example, what costs a company would incur if its “crown jewel” of data was stolen — either because a dollar value would be impossible to calculate, or because an organization typically overestimates the value of its own data. Even without these costs included, the report showed the cost range spanning all the way from the low of $1.3 million to the high of $58 million, a number Ponemon said even the largest organizations would notice.
Advanced Persistent Threats – AhnLab Malware Defense
Most cyber threats originate from outside networks and exploit known vulnerabilities. These attacks have been responded to via conventional security methods, such as with antivirus, firewall, and IPS solutions. However, more recent and sophisticated cyber-attacks have targeted organizations by injecting malware or files into web applications or email used by employees.
In 2012, Advanced Persistent Threat (APT) attack techniques evolved further to disguise executable files with common application icons, such as those representing a doc file. Users who believe that the file is safe then unwittingly launch a malicious executable by opening the file.
If you are to look at the entire threat landscape, roughly 80-85% of all threats today are “known”, there are signatures written to protect against them. However, it’s those 15-20% of new variants, never been seen before, zero-day threats that will make you tomorrow headline. There are 350K new malware samples found every day. Traditional security solutions such as Firewall, IDS/IPS, AV, Web & Mail Filtering are all signature based solutions and can only protect against those “known” threats.
Signature based solutions are still needed but Advanced Malware, Advanced Persistent Threat (APT), Data Breach Detection and Prevention solutions like our AhnLab MDS are now required to augment those legacy signature-based solution and are a part of your defense-in-depth strategy.
To find out more, download the whitepaper Multidimensional Analysis of Malware, or contact us for more information.
Sophos – Leader in Magic Quadrant for UTM
Gartner recognizes Sophos as a Leader in the Magic Quadrant for Unified Threat Management.
As threats evolve and targeted attacks grow, managing security for the network, email, web and application control becomes more complex. That’s why Sophos offer numerous industry-leading Unified Threat Management (UTM) products to securely and simply meet the needs of the evolving business network.
Gartner has recognized Sophos as a Leader in the Magic Quadrant for Unified Threat Management, for the second year in a row.
Sophos UTM eliminates the complexity of deploying and managing a variety of point solutions to secure your business against viruses, spam and hackers. It combines all the security solutions you need within a single appliance, giving you centralized control through an easy-to-use console. And it’s flexible, so you can add any security options you need.
Sophos Maintains Leadership Position in the 2013 Magic Quadrant for Mobile Data Protection
BOSTON, MA – September 24, 2013 – Sophos today announced it is once again positioned in the “Leaders” quadrant of Gartner, Inc’s 2013 “Magic Quadrant for Mobile Data Protection.” The quadrant is based on an assessment of a company’s market understanding, strategy and completeness of vision within the Mobile Data Protection (MDP) industry. MDP products are defined as products that protect access to secure data on storage systems in notebooks, removable media, desktops and servers. Buyers want common protection policies across multiple platforms, minimal support costs and proof of protection.
According to Gartner, Leaders are at the forefront of making and selling mobile data protection products that are built for enterprise business environments. The requirements necessary for leadership include a long-term road map that follows and/or influence Gartner, Inc’s vision of the developing needs of buyers in the market. Vendors in this quadrant lead the market by making their competitors’ sales staffs nervous and force competitors’ technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists.
“To be positioned as a leader for the past nine years is a testament to our product teams who continue to deliver innovative encryption and data protection products,” said John Shaw, Vice President for enduser security products at Sophos. “An aggressive roadmap, coupled with our plans to make it even simpler for small and medium sized businesses to protect their data by encrypting drives, files, cloud storage and mobile files invisibly, positions us for even more success in the months and years ahead.”