Cyber Attackers Have Many Options, Unless You Limit Their Moves

February 22, 2016 Amy Burnis

Cyber Attackers Have Many Options, Unless You Limit Their Moves If you have read Verizon’s “2015 Data Breach Investigations Report,” you’ll recall the following notable findings:

  • Advanced attacks often start with phishing emails, and a campaign of just 10 emails will typically yield a greater than 90 percent chance that at least one person will become the criminal’s prey.
  • In 60% of cases, attackers are able to compromise an organization within minutes.
  • 75% of attacks spread from Victim 0 to Victim 1 within one day (24 hours).

Another troubling trend is a growing “detection deficit” between attackers and defenders. Attackers who are on a network often have more than 200 days before being discovered.

Remember, privileged accounts are everywhere – in every networked device, database, server, and social media account on-premise and in the cloud. This reality requires new layers of security. Sure, it’s a good idea to educate employees about cyber security risks and best practices, but human error will continue to be a weak link even with best efforts. Behave as if you’ve already been breached. Attackers will find a way in and take actions to escalate privileges until they achieve their goal – whatever it may be. Don’t make it easy for them. Reduce your attack surface with proactive controls and keep an eye on threat analytics for early detection. Our latest graphic offers five steps you can take to limit attackers’ options once they’re inside the network.

Previous Article
IDC: Organizations Can’t Afford to Overlook SSH Keys
IDC: Organizations Can’t Afford to Overlook SSH Keys

It’s no secret that privileged accounts are exploited in the vast majority of advanced cyber attacks, and t...

Next Article
eBook: Achieving Security and Productivity with Least Privilege and Application Control
eBook: Achieving Security and Productivity with Least Privilege and Application Control

The least privilege principle originated in the U.S. Department of Defense in the 1970s, and it was designe...