Skip to main content

Cyber Attacks Decline, But Still Top Business Concern

This is a guest article by Blake Sanders.Since the advent of the internet, companies have been able to create an online presence and gain exposure as part of their overall business strategy. The security of online stores, cable internet providers, corporate portals, and web-based account management are but the tip of a very complex iceberg. This has made hackers a very worrisome threat, and the advent of cloud computing only makes the logistics of keeping a business protected more difficult than ever before.

High-profile Cyber Attacks in 2011

So far this year, there have been a long series of high profile attacks. Just the ‘hacktivist’ collective known as Anonymous alone has taken responsibility for attacks that took down websites and services for Master Card, Paypal, the Recording Industry Association of America and even government websites for the CIA and the Lybian government. LulzSec, another hacking group related to Anonymous, brought down the Sony Playstation network for weeks and is alleged to have made off with the private information of more than 70 million customers – this includes account passwords, credit card numbers, physical addresses and much more.

Drop in Attacks Overall

Yet, for all the high-profile attacks that have happened so far this year, there is actually a drop in cyber attacks according to a recent security survey released by Symantec. Data gathered from over 3,300 respondents spanning 36 countries, unsurprisingly, mentions cyber security as the main cause of concern for businesses for the second year in a row, but also indicates companies are getting better at fighting off these attacks.

For example, earlier this year, a concerted ‘Denial of Service’ attack on Amazon.com was successfully repelled by the online retailer by using clever and newer server-side defensive measures. Of the respondents who indicated losses due to cyber attacks during 2010, the percentage of those who faced losses in 2011 dropped down to 92 percent.

This may also be due to an overall decrease in the amount and intensity of the attacks themselves. This year 70 percent of surveyed businesses were victims of cyber attacks, which represent a 5 percent drop from the previous 12 months. From those who were targeted by hackers, only 21 percent reported an increase in attack frequency – a sharp decrease compared to last year’s 29 percent.

Taking Better Precautions

Fortunately, companies are getting increasingly good at cyber damage control; and only 20 percent of them suffered monetary loses of $195,000 or more.

Main Concerns for Businesses

From all the damages reported, the top issues were downtimes at 43 percent, employee data theft with 20 percent and intellectual property robbery at 19 percent. Lost productivity was the main effect, at 35 percent, but also 23 percent of respondents indicated lost revenue as the most costly consequence.

Interestingly enough, while ‘Denial of Service’ attacks have been the topic of the top news stories this last year, in reality these only grew 18 percent in the last 12 months. The attacks increasing in activity the most are malicious code at 30 percent and social engineering with 26 percent.


Biggest Threat Moving Forward


Social engineering is perhaps the biggest unsung threat of today’s cyber world, mostly because of how low tech it really is. In social engineering, hackers use deception, trickery and manipulation to make workers divulge passwords, usernames and other security information, usually by impersonating either a superior or IT staff. Many hackers will not spend the better part of the week figuring out an access code when they can trick a worker into giving them access in a couple hours.

As usual, the poll is not infallible and it has 95 percent reliability, give or take 1.8 percent. Still, it shows some very interesting numbers and a noticeable improvement on the security measures businesses use to fend off cyber attacks.

Blake Sanders writes on tech issues at broadband comparison site Broadband Expert, where he specializes in cable internet providers, wireless broadband, and industry news and insights.



Technology Blog

Comments

Popular posts from this blog

Touch Screen Games for Windows 7

The touch screen system is a great system that can make life a lot easier. It can also bridge the gap between laptop or PC and the tablet. The

Time to Think about Time

This is a guest post by Isabella . The Millennium Bug seems like a long, distant memory, but in the late 1990s, the Y2K bug was sending fear and panic among network administrators, governments and businesses alike. Cash machines were expected to start dishing out dollars like fruit machines, high interest current accounts would empty, planes would fall from the sky and the world was going to plunge back into the dark ages, as every computer system failed. Okay, things didn’t seem to work out to be that bad. Few if any major computer meltdowns occurred, and the world moved on. The threat of the Millennium Bug was quite simply caused by a lack of foresight by computer manufacturers and programmers. Many computer programs only bothered to store the year in two decimal places, which meant that come the year 2000, a lot of timestamps would go from 99 to 00, essentially making the computer believe it was the year 1900. The debate was never settled whether the Y2K bug was just a damp sq...

Best Free Project Management Software

Businesses in today's day and age seem to be faced with various problems, such as escalating expenses, overdue deadlines, and improper delegations of tasks, to name a few. Because of this, it would be of the utmost essence for companies to choose the perfect project management software for their business. Fortunately, there are many options in today's market that can satisfy practically any demand a business might have, regardless of how big or small it might be. Here are some of the best offerings in project management software today: 1. Asana Asana focuses mostly on improving a team's workflow. One advantage that this service has over the rest is that smaller teams can use it completely free of charge. Also, aside from all of the basic features that project management tools tend to have, Asana developers have made it possible for users to get task notifications directly in their email inboxes. Plus, Asana can be used on most tablets and mobile phones. In fact, it eve...

A Roundup of Must Have Google Resources

This is a guest post by Crystal J. Briscoe . Google have several resources available that helps those people who own their website. These resources help you in the success of the business. The Google resources could be accessed easily if you have a Google account. Once signing with the Goggle account the user would be able to use the various resources available online. 1. Resources available for free: As Google wants the people to use its resources hence these are offered free of cost. The user could enjoy their services based on the requirements. As most people uses Yahoo for email service, hence Google offered the users to sign in with a single user id and gain access to its various recourses. 2. Various Google Resources: In order to make use of the Google resources one must have the Gmail account that would help in utilizing there resources. You Gmail account would help in using different resources available easily. Just logging with your Gmail account and you will be a...

How To Maximize Real Time Communications

Voice over Internet Protocol (VoIP) and the primary rate interface (PRI) services that come with the infrastructure have given offices many different options when it comes to real time digital communications. Some of the features of these services can be integrated into an office so that problems are more quickly solved and communications become more efficient and cost-effective. These ways to maximize real time communications in the office can rely on intrinsic features of the technology or they can involve carefully chosen suites of applications that work together. Session initiation protocol (SIP) forking is a feature of many business VoIP services . SIP forking allows a single digital channel to be forwarded to multiple destinations. This can be used to send a call from a single phone to multiple other devices. If an employee is not at a particular station to answer a phone, then the signal can be forked to a cell phone or another location until the employee receives the call. Th...

HTC EVO 3D Confirmed for UK Release

This is a guest post by Simon about EVO 3D from HTC, which is now coming to Europe in July HTC's 3D phone, the EVO 3D, has now been confirmed as heading to UK markets. Although the phone has been known about for some time there was some uncertainty about which markets it would be released in. As the EVO 3D takes a lot of inspiration from the earlier US-only HTC EVO there was some speculation that it would also be bound solely for the United States. The HTC EVO 3D is similar in many respects to the Sensation. There is a similar specs list for hardware although the EVO 3D will feature a parallax barrier display like the ones found on the LG Optimus 3D and the Nintendo 3DS. After LG's device this will be the second 3D smartphone released to many markets although the EVO 3D is much more tantalising in what it has to offer. Like the Sensation the EVO 3D will come with a qHD display and dual core 1.2GHz chip, making it more visually appealing and powerful than the only oth...

How mobile monitoring apps are changing the spy world?

Parents always expect the best out of their children, and so does the employers from their employees. For instance, parents buy their kids a smartphone, and expect them to do well in their academics. Similarly, an employer issues smartphones to their employees to ensure that they excel at work, and contribute towards maximizing profits in the business. However, when expectations are not met, or if you sense that there is something inappropriate concerned to their activities or behavior, then the need to monitor their cell phones arises. In addition, if you suspect that your spouse is giving your share of time and attention to another person, you are certainly left with no option but to monitor their activities. Role of Mobile Monitoring Apps The best method to monitor on someone is through mobile monitoring applications. These apps make your task of monitoring simpler like never before. The application fulfills the spying requirements of distinct individuals accurately. It not o...

Best iPad games: see what others are playing

If you’re looking to have some mega-fun on your iPad, then you need to look for the kinds of games that have gained massive popularity. Their

5 Blogging Mistakes That Can Be Fixed Easily

This is a guest post by Crystal J. Briscoe about five common Blogging Mistakes That Can Be Fixed Easily . One of the most annoying things about reading a really good blog content is the inability to navigate the blog or change the view with ease. While most bloggers usually make certain errors while building their blogs, the following are some of the mistakes that can make your blog useless and what you can do to fix them. 1) Using Mysterious Fonts For Your Blog Contents Whereas making use of distinct fonts to design your blog logo or to create titles for your sidebars can provide your site with a unique look, they should not be used for creating blog content. Fonts that every blogger should use when developing contents for their sites are Times New Roman, Georgia and Serif. This is because these fonts are easy to read by virtually anyone. 2) Building A Compacted Content Zone First-time web developers usually make the error of stuffing their content in a small region on their...