BREACH MGTCYBERSECURITY

Prevention, Detection, and Recovery from Cyberattacks- Part I

3 Mins read

During the team discussion about next-gen tools and techniques for prevention, detection, and recovery from cyberattacks, we started looking at some of the common mistakes that could have prevented the cyberattacks.

The careful investigation shows that cyberattacks can be very damaging, and human error is the major factor. According to Verizon’s 2020 Data Breach Investigations Report (DBIR) 22% breaches are caused due to Human Error. Since 2010, breaches due to human error have increased, breaches due to malware have decreased, and insider abuse has dropped drastically. IBM study published in July 2019 found that inadvertent breaches from human error and system glitches were still the cause for nearly half (49%) of the data breaches in the report, costing companies $3.50 and $3.24 million, respectively. Human error caused 90% of cyber data breaches in 2019, according to a CybSafe analysis of data from the UK Information Commissioner’s Office (ICO).

In the near past, network security was focused on big corporations and institutions. Nowadays, every person might be a potential victim of cyberattacks. Hence, we decided to list some myths and realities about cyberattacks.

MythReality
Only certain industries are vulnerable to cyber attacksAny organization with sensitive information is vulnerable to attack
An infected computer displays a message intended to scare the user or operates very slowlyHackers want to control the system or steal information, and they are not interested in displaying a skull on the screen
The company has a firewall hence the company is in good shapeA well-configured firewall can protect the company, but most of the time insider attack is often the biggest vulnerability
The corporate systems are disconnected from the internet, so the company will not have any risksInternal threats pose a large threat   USB drives, laptops, etc. that are brought into the isolated network can introduce huge risks
Small and medium-sized organizations are not targeted by hackersAlmost third or 28% of data breaches in 2020 involved small businesses as per Verizon Business 2020 Data Breach Investigations Report (2020 DBIR)
Anti-virus and anti-malware software keep the organization completely safeThe malware or virus protection software cannot protect against all cyber risks especially there could be zero-day attacks
The company virus detection software is up to date, so it is safeVirus detection software detects known virus signatures New and mutating virus’ can evade signatures
The user will know right away if your computer is infectedModern malware is stealthy and remains undetected for a longer time
Cybersecurity threats come from the outsideInsider threats are just as likely, and harder to detect
A VPN makes the organization completely anonymousEven though VPN data tunnel is encrypted attacks come in many forms and the organization are not immune to other types of security compromises
If Wi-Fi has a password, then it is secureAll public Wi-Fi can be compromised, even with a password
Complete cybersecurity can be achievedCyber preparedness is ongoing, with a new threat emerging every day
A strong password is enough to keep the business safeTwo-factor authentication and data monitoring are required to protect the organization from emerging threats
Attackers rush to get in and leave quicklyAttackers deploy “low and slow” techniques
Governments’ new stricter cybersecurity laws and policies are discouraging cybercriminalsAccording to Interpol Cybercriminals are developing and boosting their attacks at an alarming pace, exploiting the fear and uncertainty caused by the unstable social and economic situation
Effective response equals fast response hence low impactAttackers perform several decoy operations to distract response teams
Cybersecurity specialists are capable of effectively managing the growing number of cyber threats as a direct result of technological advancements in big data analyticsThe majority of small to mid-size enterprises have made relatively limited technological investments to enhance cybersecurity, due to financial reasons
With the help of the FBI, local law enforcement, and cybersecurity experts, the Government can deal with ransomware quite efficientlyFew examples will clarify the reality: In May 2019, the City of Riviera Beach, Florida paid 65 bitcoins (approx. $600,000) ransom to regain access to their computers.In March 2019, Jackson County, Georgia ended up paying $400,000 to get rid of the RYUK ransomware infection.
Cyber liability insurance coverage can ensure the organizations are financially protected from costly cyber fraud and data breachesMost companies find it to be challenging to substantiate some of the damages while preparing a cyber data breach claim and do not always receive full reimbursement

The list of myths and realities is compiled using several data sources includes WaTech’s state Office of Cybersecurity (OCS), Verizon DBIR, IBM Study Report, and CybSafe report.

Related posts
CYBERSECURITYRISK & COMPLIANCE

Prevention, Detection, and Recovery from Cyberattacks Part III

2 Mins read
Is Zero Trust a model for effective and efficient security? We are adding a third blog post in the series of Prevention, Detection, and Recovery…
CYBERSECURITY

Prevention, Detection and Recovery from Cyberattacks

2 Mins read
This is a sixth blog post in the series of Prevention, Detection, and Recovery from Cyberattacks. The global survey conducted by Ponemon Institute and sponsored…
BREACH MGTCYBERSECURITY

Prevention, Detection, and Recovery from Cyberattacks - Part II

2 Mins read
The second blog post in the series of Prevention, Detection, and Recovery from Cyberattacks. The global survey conducted by Ponemon Institute and sponsored by IBM…
 

Leave a Reply

Your email address will not be published. Required fields are marked *