">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Sunday, January 24, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Organization to adopt ‘all hands on deck’ approach to counter cyber attacks-Cisco Systems

Susan Mwenesi by Susan Mwenesi
6 years ago
in Tech
4 min read
0

CybercrimeWith attackers becoming more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, it then becomes necessary for organizations to adopt a ‘all hands on deck’ approach to defend themselves.

This is according to the Cisco 2015 Annual Security Report  which examines both threat intelligence and cybersecurity trends and which revealed that defenders, namely, security teams, must be constantly improving their approach to protect their organization from these increasingly sophisticated cyber attack campaigns.

These issues are further complicated by the geopolitical motivations of the attackers, conflicting cross-border data localizations and sovereignty requirements.

The report findings conclude that its time for corporate boards to take a role in setting security priorities and expectations

 “Online criminals are expanding their tactics and morphing their messages to carry out cyber-attack campaigns and make it harder to detect them,” read part of the report.

The top three trends that Cisco’s threat intelligence uncovered are Snowshoe spam where attackers send low volumes of spam from a large set of IP addresses to avoid detection, Web Exploits Hiding in Plain Site and Malicious Combinations where Flash and JavaScript weakest parts  are combined and Flash malware can now interact with JavaScript to hide malicious activity by sharing an exploit between two different files: one Flash, one JavaScript.

“Users are caught in the middle. Not only are they the targets, but end-users are unknowingly aiding cyber attacks. Throughout 2014, Cisco threat intelligence research revealed that attackers have increasingly shifted their focus from servers and operating systems as more users are downloading from compromised sites leading to a 280% increase in Silverlight attacks along with a 250% increase in spam and malvertising exploits,” read the report

READ  Get a FREE Samsung Galaxy Note 8 smartphone here!

Related posts

Toshiba

Chrome Now Helps You Change Weak Passwords

January 23, 2021
0

Top 5 Skills That Modern Software Developers Need to Have

January 22, 2021
0

What Software Developers Need to Know About Burnout

January 22, 2021
0

Three Kenyan teams excel at the Huawei ICT Competition Global Finals

January 22, 2021
0

 While many defenders believe their security processes are optimized—and their security tools are effective—in truth, their security readiness likely needs improvement.

Readers 946

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Tags: Cisco SystemsCyberCrimeReport
Susan Mwenesi

Susan Mwenesi

Interested in business, technology and all things startups in Africa!

Related Posts

Toshiba
Tech

Chrome Now Helps You Change Weak Passwords

January 23, 2021
0
Tech

Top 5 Skills That Modern Software Developers Need to Have

January 22, 2021
0
Tech

What Software Developers Need to Know About Burnout

January 22, 2021
0
Tech

Three Kenyan teams excel at the Huawei ICT Competition Global Finals

January 22, 2021
0
Health

54gene launches a genome sequencing lab to track infectious and non-communicable diseases prevalent in Nigeria

January 22, 2021
0
Tech

Google’s Project Loon, solar-powered internet balloons discontinued

January 22, 2021
0
kplc
Tech

Kenya Power Rolls Out A Smart Metering Project Across The Country

January 21, 2021
0
123movies
Tech

4 Best Free Movie Streaming Sites In Kenya

January 21, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Finnfund & Norfund double Starsight’s funding to $20 million for Ghana expansion

January 23, 2021

African tech startup funding passes $700m in 2020 despite COVID-19

January 23, 2021
Toshiba

Chrome Now Helps You Change Weak Passwords

January 23, 2021
Toshiba

Shoppable Ad Formats Are Coming Soon To Youtube

January 23, 2021

Hero MotoCorp Surpasses the Monumental 100M Cumulative Production Milestone

January 23, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: