Cyber complacency is real

April 2018 Editor's Choice, Information Security

CA Southern Africa has announced that Veracode has released new research, revealing the widening gap between software creation and software security, with the rush to innovate outpacing the urgency to secure the process.

The ‘Securing the Digital Economy’ report highlights how investment in software and digital transformation is rapidly accelerating, with around one in five business leaders indicating that their software budget had increased 50 percent or more over the past three years to support digital transformation projects. However, the increased software development investment has not translated to greater security budgets or awareness of the security risks insecure software introduces: only 50 percent of business leaders surveyed understand the risk that vulnerable software poses to their business.

CA Veracode commissioned YouGov to survey 1403 business leaders across Britain (653), the US (506) and Germany (244) about their company’s digital transformation initiatives and understanding of cybersecurity. The polling was conducted online over a nine-day period between September 25 and October 4, 2017.

The report indicates that 25 percent of all business leaders surveyed in Britain and US report that they do not understand any of these common cybersecurity threats:

• Vulnerable software.

• Ransomware.

• Vulnerable open source components.

• Phishing attacks.

• Malicious employee activity.

• DDoS attacks.

Not aware of high-profile cyber-attacks

The lack of understanding around cyber risk may be attributed, in part, to a lack of awareness of successful cyber-attacks and their causes. Because business leaders are unaware of either the breaches themselves or the underlying causes, they are not compelled to learn about or defend against similar threats their company could face. For example:

• Despite being highly publicised and causing several high-level executives to lose their jobs and the ex-CEO being forced to testify to the US Congress, only five percent of all business leaders surveyed indicated the Equifax breach prompted them to rethink their current business’s approach to cybersecurity;

• Only one-third of business leaders surveyed had heard of the global WannaCry ransomware attack, although awareness was greater among British business leaders at 40 percent. Just one in 10 reported it led them to rethink their approach to cybersecurity;

• Fifteen percent of business leaders surveyed in Britain and 19 percent of German business leaders had not heard of any of the high-­profile cyberattacks listed in the survey, while just under half of all US, GB and German respondents reported cyberattacks have not led their current business to rethink or update their cybersecurity approach.

We are seeing some shift in awareness, of the 33 percent who indicated that a cyber-attack on another company had led their business to rethink its approach to cybersecurity, many have either taken steps to improve their software security or plan to over the next 12 months.

More than one-third (34 percent) have or will over the next 12 months, start scanning or already scan more regularly for vulnerabilities in software; while one-fifth either have or will set security thresholds for software built by third-party providers and for all commercial out-of-the-box applications (22 percent and 20 percent, respectively).

While there may be some shift in awareness, not all business leaders have woken up to the risks of the evolving cyber threat landscape. One-third of business leaders surveyed revealed that they plan to take no new steps to improve their organisations’ overall cybersecurity in the next 12 months.

“Digital transformation presents both massive opportunity to innovate and significant security risks, with 77 percent of applications having at least one vulnerability when first scanned, which could be exploited to inject ransomware or steal data,” says Jaco Greyling, chief technology officer, DevOps solutions, CA Southern Africa.

Many business leaders have yet to fully grasp the most common cyber threats to their business, nor are they keeping up with some of the most catastrophic cyber events of our time. We need to bridge this disconnect between business leaders and the cybersecurity threat: without greater awareness of the threats and what is needed to defend against them, their company could easily be the next headline.”

Executives will act when you talk about the personal risk

While high profile breaches do not in themselves prompt great change in behaviour, when confronted with the possibility of personal accountability in the event of a breach, executives are more likely to take action. More than a third of the business leaders surveyed said the personal risk to executives outstripped compliance as a driver for board members.

Articulating the potential brand damage for senior executives from a data breach and the risk to their job security, was recommended by 38 percent and 35 percent of business leaders surveyed, respectively, as a way to engage a board on cybersecurity, compared to just 29 percent who suggested that highlighting the potential fines of data protection regulations, like GDPR.

Download the Securing the Digital Economy report at https://info.veracode.com/securing-the-digital-economy-survey-report-resources.html, or view the report infographic at https://info.veracode.com/securing-the-digital-economy-infographic-resources.html.

For more information, contact CA Southern Africa, +27 (0)11 417 8594, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Scammers take advantage of desperate need for cash
Editor's Choice News & Events Security Services & Risk Management
Revitalised from their end-of-year holiday, South Africans typically tackle the new year with gusto and renewed vigour, but so do the criminals as they prepare for the rush back to school or university

Read more...