Business Is Struggling To Combat Hacking

Businesses are struggling to keep up with the threat posed by cyber criminals, according to a new report.

Published January 19th, the 2016 Cisco Annual Security Report (ASR) has shed light on the issues businesses are currently facing when it comes to cyber security.

This report highlights that, while threats to security and risks such as phishing attacks have remained relatively constant since the first ASR was published in 2007, what is really notable is how quickly cyber criminals innovate to take full advantage of any security gaps in new technology.

Also concerning is that they are also making use of older malware to attack out-of-date systems, which are more vulnerable than up-to-date software. 

In a blog announcing the report's release, senior vice-president, chief security and trust officer at Cisco John Stewart said: "Aging infrastructure opens up green-field attack surfaces while uneven or inconsistent security practices remain a challenge."

He also highlighted that attackers are growing "more bold, flexible, and resilient", while companies are struggling to keep up with global digitisation, notably in terms of detection speeds and staff education.
 
Furthermore, a lack of global coordinate defence against cyber attacks was cited as another weak spot in preventing cyber crime. 

"On the global front, we see fluctuations in cyber internet governance across regions, which inhibits collaboration and the ability to respond to attacks," he explained.

Recently, Wi-Fi hotspots have fallen under scrutiny too. The risks they pose were recently highlighted by the Evening Standard, which reported that such hotspots are increasingly at risk of being hit by criminals - something that businesses and individuals alike can fall prey to.

Mr Stewart suggests that, to tackle risks such as those outlined in the ASR, companies need to act now. In addition to greater global coordination, he suggests senior leaders need to do more to embrace cyber security. Furthermore, vendors who embed IT must also commit themselves to producing secure solutions that customers can trust.

Kroll:http://http://bit.ly/1npke6z

 

« CIO Work Report - Executive Brief (£)
Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.