">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Sunday, January 17, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

7 Current Cybersecurity Stats Every Business Should Know

Milcah Lukhanyu by Milcah Lukhanyu
3 years ago
in Tech
13 min read
0

2017 stunned the online world as the year of the largest ransomware attack ever with WannaCry and the data breach at Equifax that compromised the personal information of almost half of the American population. The beginning of 2018 revealed the vulnerabilities of Meltdown and Spectre which poses a threat to every device and operating system anywhere in the world.

With cyber attacks increasing in numbers, and growing in prominence from devastating online businesses to allegedly affecting political elections, cybercrime is a growing threat. The good news for IT and security professionals is that the situation is far from hopeless. By analyzing and understanding the current trends and staying as proactive as possible on current threats, they have a solid chance of effectively dealing with the online challenges and threats they face. It can start with a proper cybersecurity employee security awareness training program.

Most Cyber Attacks are Aimed at Small to Medium Business

An estimated 75% of cyber attacks are aimed at small and medium businesses as opposed to large ones. According to the SonicWall Annual Threat report, this statistic is only expected to rise. Smaller businesses often don’t have the budget for stronger security measures or services and it leaves them more vulnerable to attack.

Most Understand Phishing But More Than Half Click on Risky Links Anyway

Ransomware is commonly delivered via phishing emails and almost 80% of internet users claim to understand the threat of unknown links in such emails. What’s baffling is that 56% of the same group tend to click on these links anyway. There are a variety of reason as to why but the simple truth is that phishing is one of the biggest cybersecurity threats facing businesses of all sizes. All it takes is for one employee to click on a link in a phishing email and a hacker has a way into the data on their device and a path into the network of the business.

Hackers Hiding in Networks

Related posts

A salesman checks a customer's iPhone at a mobile phone store in New Delhi, India, July 27, 2016. REUTERS/Adnan Abidi

How To Measure How Much You Walk On Your iPhone

January 17, 2021
0

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0

How to fuliza by Safaricom guide

January 15, 2021
0

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0

According to Microsoft, the average hacker dwells for about 146 days within a network before they are discovered. That means the hacker has roughly 5 months to harvest sensitive information, documents, and to discern vulnerabilities. It should also be remembered that the individual hackers aren’t programs or machines, but human and therefore unpredictable.

Mobile Malware is on the Rise

Mobile malware variants have increased a stunning 54% according to Symantec who blocked 24,000 mobile attacks every day of 2017. While keeping device operating systems updated would prevent many of these attacks, only about 20% of Android devices were running the latest version of their OS. Grayware apps also pose a threat because many of them leak the device’s phone number. It comes down to users making poor choices about which apps they allow to see and transfer their personal information.

Attacks With Fileless Techniques

One significant new trend is a change in the execution of the attacks as they shift away from using .exe (executable files) that are normally used to deploy malware. The change poses a huge threat to commonly used security solutions like antivirus which are programmed to look for .exe files.

There’s confusion because the attacks are described as “fileless” but normally other types of files are involved at different points of the strike. What’s alarming is that tools exist for these types of attacks that make it increasingly easy for those with little technical expertise to execute them. In many cases, they are able to bypass traditional security measures so they are increasingly successful. In 2017, 77% of attacks against businesses and organizations involved this delivery method according to a study by the Ponemon Institute.

READ  Airtel Nigeria Launches music streaming & Download app Wynk

Ransomware Declining While Cryptomining Malware Rises

Ransomware attacks dominated as the top threat for two years leading into the second half of 2017. According to Malware Bytes, during the first six months of 2017, 7 out of 10 attacks on companies who had malware infections turned out to be ransomware.

And then with no explanation, it stopped. As of July 2017, ransomware attacks dropped to 30% and by December it inexplicably dropped to being used in only 5% of all attacks. And during this time cryptocurrency-mining malware began to increase.

Many experts agreed that by the time Wannacry infected so many computers in May 2017, ransomware had reached the pinnacle of its journey as it had been one of the top growing security threats for years. While media was reporting on the impact of Wannacry and how far and quickly it spread, it didn’t report much about the fact that few victims were actually paying the ransoms. In the end, the attackers made $143,000 from the entire event.

In the meantime, Cryptocurrency-mining malware has proven to be a quicker way to get money by hijacking a victim’s CPU power to mine cryptocurrency directly without them even being aware of the theft. With this method, there are no potentially uncooperative victims to negotiate with. And it shows a quick shift back to malware that seeps into networks through any vulnerable points.

Security Costs are Growing

At the end of the day, many businesses are struggling with the costs for what they need to keep themselves safe from cyber thieves. While many proactive antivirus vendors are adding additional features to help with the constantly changing landscape of cybersecurity, the need for more personnel to deal with the threats have left many businesses feeling as if they are fighting a losing battle.

Worldwide cybersecurity costs are estimated to reach $96 billion in 2018. With the high-profile attacks and data breaches of 2017, like Equifax, companies are aware of both the immediate and long-term consequences if they are compromised and are striving to do whatever they can to keep the unthinkable from happening.

Be Proactive, Not Reactive

The need to be proactive in watching for and effectively dealing with internal and external weaknesses needs to be a top priority for all businesses, regardless of their size. In studying cybersecurity stats, adjusting policies and practices as needed, and making no assumptions, companies will stand a better chance of dealing effectively with cybersecurity threats as opposed to being a victim of them.

Readers 1,787

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

A salesman checks a customer's iPhone at a mobile phone store in New Delhi, India, July 27, 2016. REUTERS/Adnan Abidi
Mobile

How To Measure How Much You Walk On Your iPhone

January 17, 2021
0
cryptocurrencies

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0
How To

How to fuliza by Safaricom guide

January 15, 2021
0
Tech

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps
Tech

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0
Tech

Are Cheap TikTok Likes Inferior To Expensive Ones? Read Our Experts’ Discussion

January 15, 2021
0
Tech

Between WhatsApp, Facebook And Signal Which Platform Collects More Personal Data?

January 15, 2021
0
Tech

HTML5 Tech Takes Over from Flash to Advance E-Sports Industry

January 15, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

A salesman checks a customer's iPhone at a mobile phone store in New Delhi, India, July 27, 2016. REUTERS/Adnan Abidi

How To Measure How Much You Walk On Your iPhone

January 17, 2021

How To Scan and Sign Documents Directly From Your iPhone

January 17, 2021

realme to release more phones in 2021 to grow its smartphone market share

January 16, 2021

What You Need To Know To Manage Your Network Effectively

January 16, 2021

Baidu establishes an Intelligent electric vehicle arm to bring autonomous cars on a road near you

January 15, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: