Many Enterprises Still Blind to Security Risk, Study Finds

  /     /     /  
Publicated : 23/11/2024   Category : security


Many Enterprises Still Blind to Security Risk, Study Finds


Even as organizations continue to get hit with cyber attacks, theyre struggling to accurately measure the costs of such events to their operations, a report by Tenable and the Ponemon Institute found.



A majority of companies around the world have sustained at least two cyber attacks that have disrupted their operations over the last two years, but many organizations are still unclear about the costs to their businesses of such attacks.
Specifically, 60% of organizations over the past 24 months have endured cyber attacks that have either exposed sensitive data, caused disruption or temporarily shut down their business operations or equipment, while 91% had been the victim of at least one such attack, according to a recent study released by cybersecurity vendor Tenable.
However, the study,
Measuring and Managing Cyber Risks to Business Operations Report,
conducted by Ponemon Institute, also found that 54% of organizations arent measuring the business costs of such cyber attacks, which means they have no way of accurately measuring their risk or making risk-based decisions based on quantifiable data. This presents a significant problem for businesses, given the complexities of their increasingly connected IT environments due to such trends as the Internet of Things (IoT), the cloud, greater mobility and DevOps, according to Tenable officials. (See
Five IoT Endpoint Security Recommendations for the Enterprise
.)
(Source:
iStock
)
The lack of cybersecurity maturity present in many enterprises creates real-world problems, Gavin Millard, vice president of intelligence at Tenable, told Security Now in an email. One of the more critical issues is a lack of actionable insight into an organizations true level of exposure. Other potential consequences include downtime of critical systems, customer turnover, loss of market share and financial loss. In todays digital era, cyber risk is business risk. This means that organizations must not only understand where they are exposed and to what extent, but they must also have the resources, processes and technology in place to actively reduce their risk.
Digital transformation changes the game
The report -- in which 2,410 IT and information security officials in six countries were surveyed -- found the ongoing digital transformation at organizations has created a large attack surface while making it difficult for companies to fully understand their risk exposure.
Only 29% of respondents reported that they had sufficient visibility into their attack surface -- which includes traditional IT environments as well as the cloud, containers, IoT and operational technology -- to reduce their chances of being impacted by a cyber attack, while 58% told researchers that they dont have enough security staffing to scan for vulnerabilities as well as they need to.
Of those surveyed, 35% report that they only scan when its needed to protect sensitive data.
Even those organizations that do measure the risks to their businesses posed by cyber attacks are unsure about what theyre doing. The survey found that 62% of them arent confident in the accuracy of the metrics theyre using, so many of them are making business decisions without such information as the cost from IP thefts or the loss of revenue or productivity.
(Source:
Tenable
)
Digital transformation is putting immense pressure on security teams as they work to keep their dynamic IT environments secure, Millard added. At the same time, theyre saddled with security tools and approaches created for the old-world of on-premises servers and workstations. The security industry -- vendors and security organizations alike -- have not kept pace with todays digital enterprise, leaving organizations everywhere exposed as the attack surface continues to expand.
IoT concerns
The far-reach connectivity inherent in modern computing environments makes cybersecurity even more challenging. Millard noted that few IoT devices are made with security in mind, which means they dont have the same baseline security requirements that organizations look for. In addition, the security risk is increased when employees bring such devices into the corporate environment without the security teams knowledge or approval.
Many organizations have quickly realized that IoT has expanded their attack surface and are actively working to manage, measure and reduce the cyber risk the devices introduce, he said. On the other hand, some organizations are still flying blind when it comes to securing IoT and are unable to identify all of the assets, including transient devices, that are connected to their network.
Researchers with NetScouts ASERT recently found
that IoT devices are the targets of increasingly sophisticated botnet attacks that exploit vulnerabilities and attack devices sometimes within minutes of them coming online. That report came soon after another from Trend Micro, which said that the Message Queuing Telemetry Transport (MQTT) protocol and Constrained Application Protocol (CoAP), which are crucial to the machine-to-machine communications that underpin the IoT, are rife with vulnerabilities. (See
M2M Protocols Expose IoT Data, Trend Micro Finds
.)
In addition to IoT security challenges, businesses are increasingly finding themselves at risk due to security issues of their supply chain partners and others outside of the company.
The modern attack surface is no longer confined to your corporate network alone, Millard wrote. Organizations now rely on third parties in the form of consultants, contract workers, partners and property managers, to conduct day-to-day business. The data, systems and assets that are owned, controlled and/or stored by these third parties represent an organizations expanding attack surface. While your corporate security posture might be strong, a weak link in your supply chain can be used to compromise your data or assets.
Related posts:
Cloud, Compliance & the Death of the IT Checklist
12 Cloud Backup Tips to Protect Your Businesss Back-End Servers
Security Concerns Increasing as BYOD Programs Continue to Grow
Kubernetes & Containers Stir Security Concerns in the Cloud
— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Many Enterprises Still Blind to Security Risk, Study Finds