Hackers are attacking enterprise security with malware at a 60% success rate

Capturar

By Mark Kaelin

December 12, 2017

The Hacker’s Playbook Findings Report reveals malware attacks on enterprise security are successful more than 60% of the time. Enterprises need a plan to counteract them.

According to the third edition of the Hacker’s Playbook Findings Report, published By SafeBreach in December 2017, of the 3,400 security breach methods tested, the malware infiltration success rate reported was in excess of 60%. More significantly, once an enterprise is breached, hackers can navigate laterally through the network at an astounding rate more than 70% of the time.

 In other words, whatever your enterprise has done to protect its network from unauthorized access up to this point is almost guaranteed to be ineffective more than half the time. But while that is an uncomfortable fact to ponder, it doesn’t mean enterprises have no options to counteract that disturbing 60% hacker success rate.

Enterprises’ security protocols and protection systems, according to SafeBreach, can often be made more effective just by fine-tuning their focus. Just as it is with any technology deployment, it is vital to a system’s overall success that default configurations be modified and adjusted to fit the unique profile of the enterprise.

An enterprise can deploy the best security system available, one with all the latest and greatest features, but if it does not make configuration adjustments based on the network topology, operating system implementation, workstation functions, and a multitude of other characteristics, it is setting itself up for a potential security breach.

MORE: https://www-techrepublic-com.cdn.ampproject.org/c/s/www.techrepublic.com/google-amp/article/hackers-are-attacking-enterprise-security-with-malware-at-a-60-success-rate/

Mais do que uma solução tecnológica, somos uma decisão estratégica para as organizações.

Nossa missão é redefinir a relação das empresas com a cibersegurança e a experiência dos usuários no processo de autenticação e acesso a ativos tecnológicos.