dcsimg

One in five enterprises affected by 'advanced persistent threats'

  • Middle East: Thursday, February 14 - 2013 at 15:26

At least one in five businesses have encountered an advanced persistent threat (APT) attack, according to a cybersecurity survey of more than 1,500 security professionals.

ISACA's study, Advanced Persistent Threat Awareness, highlights the need for Middle East businesses to bolster their threat protection, with 'most enterprises' are employing ineffective solutions to stay protected.

Previously known as the Information Systems Audit and Control Association, ISACA is an international professional association focused on IT Governance.

An APT is a form of cybercriminal activity targeting political institutions and businesses. They require a high degree of preparation over a varying period of time in order to gain success. Their objectives tend to surpass immediate financial gains, with attackers working in a stealthy manner to ensure compromised systems remain accessible after any initial goals have been reached.

More than 60% of respondents believe an APT is inevitable. Attacks are often intended to steal intellectual property and have made headlines in recent years following breaches in the networks of governments and major enterprises worldwide.
"APTs are sophisticated, stealthy and unrelenting," says Christos Dimitriadis, International Vice President of ISACA and Head of Information Security at Intralot Group.

"Traditional cyberthreats often move right on if they cannot penetrate their initial target, but an APT will continually attempt to penetrate the desired target until it meets its objective - and once it does, it can disguise itself and morph when needed, making it difficult to identify or stop."

Over 60% of experts surveyed feel ready to respond to APT attacks, although antivirus/antimalware (95%) and firewalls (93%) top the list of solutions their enterprises are employing to prevent ATPs. This is a concerning finding since advanced persistent threats are known to evade such measures. The study also shows that while mobile security controls are more effective, they are used much less frequently.

2013 already the 'year of the hack'?


"We are only in February and already we can declare 2013 as the year of the hack," said Tom Kellermann, CISM, trusted advisor to the US government and vice president of cyber security for Trend Micro. "ISACA's research reveals that enterprises are under attack and they don't even know it. Bringing this awareness into the curriculum of education for security professionals is necessary to enable them to build the custom defense they need to combat these targeted attacks."

An overwhelming 96% of the experts who were asked say they believe APTs represent a credible threat to national security and economic stability. The same percentage admit they are somewhat familiar with this type of threat, though 53% doubt it differs from other types of 'traditional' cybercriminal activity. ISACA believes this may indicate many have not fully understood the risk APTs risk.

Other findings include the general acceptance that social media usage boosts the likelihood of a successful APT attempt. Nine out of 10 agreed. This is another prevalent issue for Middle East enterprises since social network penetration is soaring.

Another key weakness for Mena enterprises is the BYOD ('bring your own device') culture presenting a myriad of additional vulnerabilities for IT departments. The survey recorded 87% of respondents in agreement.
At least one in five businesses have encountered an advanced persistent threat (APT) attack
At least one in five businesses have encountered an advanced persistent threat (APT) attack
Enlarge »
Article Options

Disclaimer »

Articles in this section are primarily provided directly by the companies appearing or PR agencies which are solely responsible for the content. The companies concerned may use the above content on their respective web sites provided they link back to http://www.ameinfo.com

Any opinions, advice, statements, offers or other information expressed in this section of the AMEinfo.com Web site are those of the authors and do not necessarily reflect the views of AME Info FZ LLC / 4C. AME Info FZ LLC / 4C is not responsible or liable for the content, accuracy or reliability of any material, advice, opinion or statement in this section of the AMEinfo.com Web site.

For details about submitting your stories, please read the guide - all content published is subject to our terms and conditions