By Mark Kaelin
December 12, 2017
The Hacker’s Playbook Findings Report reveals malware attacks on enterprise security are successful more than 60% of the time. Enterprises need a plan to counteract them.
According to the third edition of the Hacker’s Playbook Findings Report, published By SafeBreach in December 2017, of the 3,400 security breach methods tested, the malware infiltration success rate reported was in excess of 60%. More significantly, once an enterprise is breached, hackers can navigate laterally through the network at an astounding rate more than 70% of the time.
Enterprises’ security protocols and protection systems, according to SafeBreach, can often be made more effective just by fine-tuning their focus. Just as it is with any technology deployment, it is vital to a system’s overall success that default configurations be modified and adjusted to fit the unique profile of the enterprise.
An enterprise can deploy the best security system available, one with all the latest and greatest features, but if it does not make configuration adjustments based on the network topology, operating system implementation, workstation functions, and a multitude of other characteristics, it is setting itself up for a potential security breach.