Mumbai– It also reveals that IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to a recent Sophos global survey ‘7 Uncomfortable Truths of Endpoint Security’. In fact, IT managers discovered 39 percent of their most significant cyberattacks on their organization’s servers and 34.5 percent on its networks. Only 7.9 percent were discovered on endpoints and 18.8 percent, which is almost double the global average, were found on mobile devices.
Sophos has announced the findings of its global survey, 7 Uncomfortable Truths of Endpoint Security, which reveal the extent to which Indian businesses are at a risk of repeated cyberattacks and are vulnerable to exploits. The survey polled more than 3,100 IT decision makers from mid-sized businesses in 12 countries including the US, Canada, Mexico, Colombia, Brazil, UK, France, Germany, Australia, Japan, India, and South Africa.
IT security continues to be a major issue across the globe with 68 percent of organisations surveyed hit by cyberattacks in the last year (76.3 percent organisations in India). On an average, organisations impacted by cyberattacks were struck at least twice.
“Server security stakes are at an all-time high with servers being used to store financial, employee, proprietary, and other sensitive data. Today, IT managers need to focus on protecting business-critical servers to stop cybercriminals from getting on to the network. They can’t ignore endpoints because most cyberattacks start there, yet a higher than expected amount of IT managers still can’t identify how threats are getting into the system and when.” said Sunil Sharma, managing director sales at Sophos India & SAARC.
Fourteen percent of IT managers who were victim to one or more cyberattacks last year can’t pinpoint how the attackers gained entry, and 17 percent don’t know how long the threat was in the environment before it was detected, according to the survey. To improve this lack of visibility, IT managers need endpoint detection and response (EDR) technology that exposes threat starting points and the digital footprints of attackers moving laterally through a network.
“IT managers who are unaware about the origins or movements of an attack, will not be able to minimize risk and interrupt the attack chain to prevent further infiltration,” said Sharma. “EDR helps them identify the risks and put a process in place for organisations at both ends of the security maturity model. If IT focuses on threat detection, EDR which is an integral piece that provides threat intelligence can quickly find, block and remediate these threats.”
On average, Indian organizations that investigate one or more potential security incidents each month spend 48 days a year (four days a month) investigating them, according to the survey. It comes as no surprise that IT managers ranked identification of suspicious events (22 percent), alert management (19 percent) and prioritization of suspicious events (13 percent) as the top three features they need from EDR solutions to reduce the time taken to identify and respond to security alerts.
“Most spray and pray cyberattacks can be stopped within seconds at the endpoints without causing alarm. Persistent attackers, including those executing targeted ransomware like SamSam, take the time they need to breach a system by finding poorly chosen, guessable passwords on remotely assessible systems (RDP, VNC, VPN, etc.), establish a foothold and quietly move around until the damage is done,” said Wisniewski. “If IT managers have defense-in-depth with EDR, they can also investigate an incident more quickly and use the resulting threat intelligence to help find the same infection across an estate. Once cybercriminals know certain types of attacks work, they typically replicate them within organizations. Uncovering and blocking attack patterns would help reduce the number of days IT managers spend investigating potential incidents.”
If you have an interesting article / experience / case study to share, please get in touch with us at email@example.com