Cyber Attackers Have Many Options, Unless You Limit Their Moves

2015DataBreachInvestigationReportInfograpic

Cyber Attackers Have Many Options, Unless You Limit Their Moves If you have read Verizon’s “2015 Data Breach Investigations Report,” you’ll recall the following notable findings:

  • Advanced attacks often start with phishing emails, and a campaign of just 10 emails will typically yield a greater than 90 percent chance that at least one person will become the criminal’s prey.
  • In 60% of cases, attackers are able to compromise an organization within minutes.
  • 75% of attacks spread from Victim 0 to Victim 1 within one day (24 hours).

Another troubling trend is a growing “detection deficit” between attackers and defenders. Attackers who are on a network often have more than 200 days before being discovered.

Remember, privileged accounts are everywhere – in every networked device, database, server, and social media account on-premise and in the cloud. This reality requires new layers of security. Sure, it’s a good idea to educate employees about cyber security risks and best practices, but human error will continue to be a weak link even with best efforts. Behave as if you’ve already been breached. Attackers will find a way in and take actions to escalate privileges until they achieve their goal – whatever it may be. Don’t make it easy for them. Reduce your attack surface with proactive controls and keep an eye on threat analytics for early detection. Our latest graphic offers five steps you can take to limit attackers’ options once they’re inside the network.