Visibility is key, and lacking

1 May 2019 Editor's Choice, Information Security

Sophos recently announced the findings of its global survey, 7 Uncomfortable Truths of Endpoint Security (http://www.sophos.com/truths), which reveals that IT managers are more likely to catch cybercriminals in their organisation’s servers and networks than anywhere else.

In fact, IT managers discovered 37% of their most significant cyberattacks on their organisation’s servers and 37% on its networks. Only 17% were discovered on endpoints and 10% were found on mobile devices.

For South African IT managers, 42% of the most significant cyberattacks were discovered on their organisation’s servers, 33% on their networks, 20% on their endpoints and 5% on mobiles.

The survey polled more than 3100 IT decision makers from mid-sized businesses in 12 countries including the US, Canada, Mexico, Colombia, Brazil, UK, France, Germany, Australia, Japan, India, and 200 from South Africa. The 7 Uncomfortable Truths of Endpoint Security survey was conducted by Vanson Bourne, an independent specialist in market research, in December 2018 and January 2019. All respondents were from organisations with between 100 and 5000 employees.

“Servers store financial, employee, proprietary, and other sensitive data, and with stricter laws like GDPR or PoPI that require organisations to report data breaches, server security stakes are at an all-time high. It makes sense that IT managers are focused on protecting business-critical servers and stopping attackers from getting on the network in the first place and this leads to more cybercriminal detections in these two areas,” said Chester Wisniewski, principal research scientist, Sophos. “However, IT managers can’t ignore endpoints because most cyberattacks start there, yet a higher than expected amount of IT managers still can’t identify how threats are getting into the system and when.”

26% of South African IT managers who were victim to one or more cyberattacks last year can’t pinpoint how the attackers gained entry, and 18% don’t know how long the threat was in the environment before it was detected, according to the survey. To improve this lack of visibility, IT managers need endpoint detection and response (EDR) technology that exposes threat starting points and the digital footprints of attackers moving laterally through a network.

“If IT managers don’t know the origin or movement of an attack, then they can’t minimise risk and interrupt the attack chain to prevent further infiltration,” said Wisniewski. “EDR helps IT managers identify risk and put a process in place for organisations at both ends of the security maturity model. If IT is more focused on detection, EDR can more quickly find, block and remediate; if IT is still building up a security foundation, EDR is an integral piece that provides much needed threat intelligence.”

The global average time spent investigating potential security issues is about four days a month, or 48 days a year. However, the report states only 15% turn out to be actual infections. “As a result, organisations are spending 85% of the time investigating non-issues, equivalent to around 41 days each year. This has significant financial and productivity implications:

• Direct cost – the financial and resourcing impact of spending such significant amounts of time investigating non-issues

• Opportunity cost – the IT activities that staff are not getting to because they are investigating non-issues.”

On average, South African organisations that investigate one or more potential security incidents each month spend 36 days a year (three days a month) investigating them, according to the survey. It comes as no surprise that regional IT managers ranked identification of suspicious events (31%), alert management (22%) and ability to search on file attributes (12%) as the top three features they need from EDR solutions to reduce the time taken to identify and respond to security alerts.

“Most spray and pray cyberattacks can be stopped within seconds at the endpoints without causing alarm. Persistent attackers, including those executing targeted ransomware like SamSam, take the time they need to breach a system by finding poorly chosen, guessable passwords on remotely accessible systems (RDP, VNC, VPN, etc.), establish a foothold and quietly move around until the damage is done,” said Wisniewski. “If IT managers have defence-in-depth with EDR, they can also investigate an incident more quickly and use the resulting threat intelligence to help find the same infection across an estate. Once cybercriminals know certain types of attacks work, they typically replicate them within organisations. Uncovering and blocking attack patterns would help reduce the number of days IT managers spend investigating potential incidents.”

56% of respondents from South Africa said they were planning to implement an EDR solution within the next 12 months. Having EDR also helps address a skills gap. 75% of IT managers wish they had a stronger team in place.

The full report is available at www.securitysa.com/*sophos1, redirects to https://www.sophos.com/en-us/medialibrary/gated-assets/white-papers/sophos-seven-uncomfortable-truths-about-endpoint-security-wpna.pdf





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The bane of burnout
Editor's Choice Security Services & Risk Management
The World Economic Forum has recently formally acknowledged burnout as an occupational syndrome, giving it a status that is even more worthy of being taken seriously and resolved as quickly as possible.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Scammers take advantage of desperate need for cash
Editor's Choice News & Events Security Services & Risk Management
Revitalised from their end-of-year holiday, South Africans typically tackle the new year with gusto and renewed vigour, but so do the criminals as they prepare for the rush back to school or university

Read more...