The survey, from Anomali – market leaders in threat intelligence platforms, also shows that almost a quarter believe they are over a year behind the average threat actor, and half of this admitting to two-five years behind.
The worrying information confirms that many organisations are not adequately mitigating cyber risks, despite detection and response being cited as the top security priority.
Results from the survey show:
It shows that organisations not only struggle to detect malicious activity at the earliest stage of a breach, but do not learn from past exposures, which leaves numerous vulnerabilities undiscovered.
Organisations need to be educated that cyber attacks are not ‘lucky shots’ but deliberately planned and executed over time, with cyber criminals lurking undetected inside enterprises’ IT systems for 200 days or more before discovery.
While lurking in the background, attackers can gain access inside the network, escalate privileges, search for high value information, and ultimately exfiltrate data or perform other malicious activities. However, the survey shows just 20% consult past logs daily.
“The ‘200 day problem’ arises from the fact that logs are produced in such massive quantities that typically only 30 days are retained and running searches over long time ranges can take hours or even days to complete,” says Jamie Stone, Vice President, EMEA at Anomali. “Detecting a compromise at the earliest stage possible can identify suspicious or malicious traffic before it penetrates the network or causes harm. It’s imperative to invest in technologies security teams can use to centralise and automate threat detection, not just daily but against historical data as well.”
“Organisations must wake up to the daily reality of cyber-attacks and start viewing security as a business enabler that can support and add value to the business as it transforms and innovates. It’s all too common that IT purchase decisions are driven solely by budget rather than need. Implementing the bare minimum is not an option, bolstering cyber security postures must be prioritised. Solutions such as a threat intelligence platform will enable organisations to proactively detect and respond to the modern cyber adversary,” continued Mr Stone.
If you would like to join our community and read more articles like this then please click here