You are here: Home » News-IANS » Defence-Security
Business Standard

Disruptive technology ups cyber security threats: Study

IANS  |  Bengaluru 

A study by software major has revealed that disruptive technology had led to a dramatic increase in cyber security threats all over the world.

"Number of records stolen the world over rose 53.6 per cent in 2016 from 2015 due to disruptions in the cyber security domain," said the company's maiden study on 'State of Cyber Security Report, 2017' here.

Flagging the macro, micro and meso trends in cyber security and disruptions, the study noted that data breaches in public resulted in high peaking of negative sentiments on social media against the enterprise concerned, indicating the post facto Twitter sentiment analysis.

"A record 56 per cent of breaches reported had user credentials (passwords) as part of the types of data stolen, implying that damage could be perpetrated using the stolen data," asserted the report.

Another highlight of the report said that, at 33.3 per cent, Angler, RIG and Nuclear were among the most observed exploit kits used by cyber criminals.

According to data analysis, 56 per cent of malware attacks in 2016 were due to Trojans, while viruses and worms were 19-20 per cent.

"Majority of the security products were vulnerable to exploitation and CISOs (Chief Information and Security Officers) have to track them 24x7," noted the study.

Emergence of the new 'Internet of Everything', like connected cameras, cars, health and industrial automation devices proves to be a launch pad for the "hacking for hire" industry.

"Cyber security is becoming a priority for businesses. It has become critical to identify risks near real-time and empower stakeholders to take actions and decisions based on priority," said the IT major in a statement citing the study report.

The Internet of Things (IoT) devices come with a low memory and processing footprint and have little security capabilities, including patching. Once "online" with an IP address, the devices are easy prey for hacking syndicates, who develop custom malware to take their control en masse and use them as a launch pad for cyber-attacks.

Noting that responsibility for governance of data privacy was still centralised, lying with cyber officers for 71 per cent of enterprises, the report said privileged access to data was ranked the highest amongst data security controls.

The report also highlighted key findings on attacks, vulnerabilities and cyber defence useful for teams across cyber security strategy, operations and risk management.

"The report brought a mix of research and analysis on attacks, vulnerabilities, and cyber weapons and contrasts their impact on defence mechanism," said Sheetal Mehta, Wipro's Vice-President for cyber-security and risk services, in the statement.

The study was conducted in 11 countries across North America, Europe, Asia-Pacific, West Asia and South Asia interviewing 139 organisations in diverse industry sectors.

--IANS

fb/vgu/dg

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

RECOMMENDED FOR YOU

Disruptive technology ups cyber security threats: Study

A study by software major Wipro has revealed that disruptive technology had led to a dramatic increase in cyber security threats all over the world.

A study by software major has revealed that disruptive technology had led to a dramatic increase in cyber security threats all over the world.

"Number of records stolen the world over rose 53.6 per cent in 2016 from 2015 due to disruptions in the cyber security domain," said the company's maiden study on 'State of Cyber Security Report, 2017' here.

Flagging the macro, micro and meso trends in cyber security and disruptions, the study noted that data breaches in public resulted in high peaking of negative sentiments on social media against the enterprise concerned, indicating the post facto Twitter sentiment analysis.

"A record 56 per cent of breaches reported had user credentials (passwords) as part of the types of data stolen, implying that damage could be perpetrated using the stolen data," asserted the report.

Another highlight of the report said that, at 33.3 per cent, Angler, RIG and Nuclear were among the most observed exploit kits used by cyber criminals.

According to data analysis, 56 per cent of malware attacks in 2016 were due to Trojans, while viruses and worms were 19-20 per cent.

"Majority of the security products were vulnerable to exploitation and CISOs (Chief Information and Security Officers) have to track them 24x7," noted the study.

Emergence of the new 'Internet of Everything', like connected cameras, cars, health and industrial automation devices proves to be a launch pad for the "hacking for hire" industry.

"Cyber security is becoming a priority for businesses. It has become critical to identify risks near real-time and empower stakeholders to take actions and decisions based on priority," said the IT major in a statement citing the study report.

The Internet of Things (IoT) devices come with a low memory and processing footprint and have little security capabilities, including patching. Once "online" with an IP address, the devices are easy prey for hacking syndicates, who develop custom malware to take their control en masse and use them as a launch pad for cyber-attacks.

Noting that responsibility for governance of data privacy was still centralised, lying with cyber officers for 71 per cent of enterprises, the report said privileged access to data was ranked the highest amongst data security controls.

The report also highlighted key findings on attacks, vulnerabilities and cyber defence useful for teams across cyber security strategy, operations and risk management.

"The report brought a mix of research and analysis on attacks, vulnerabilities, and cyber weapons and contrasts their impact on defence mechanism," said Sheetal Mehta, Wipro's Vice-President for cyber-security and risk services, in the statement.

The study was conducted in 11 countries across North America, Europe, Asia-Pacific, West Asia and South Asia interviewing 139 organisations in diverse industry sectors.

--IANS

fb/vgu/dg

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

image
Business Standard
177 22

Disruptive technology ups cyber security threats: Study

A study by software major has revealed that disruptive technology had led to a dramatic increase in cyber security threats all over the world.

"Number of records stolen the world over rose 53.6 per cent in 2016 from 2015 due to disruptions in the cyber security domain," said the company's maiden study on 'State of Cyber Security Report, 2017' here.

Flagging the macro, micro and meso trends in cyber security and disruptions, the study noted that data breaches in public resulted in high peaking of negative sentiments on social media against the enterprise concerned, indicating the post facto Twitter sentiment analysis.

"A record 56 per cent of breaches reported had user credentials (passwords) as part of the types of data stolen, implying that damage could be perpetrated using the stolen data," asserted the report.

Another highlight of the report said that, at 33.3 per cent, Angler, RIG and Nuclear were among the most observed exploit kits used by cyber criminals.

According to data analysis, 56 per cent of malware attacks in 2016 were due to Trojans, while viruses and worms were 19-20 per cent.

"Majority of the security products were vulnerable to exploitation and CISOs (Chief Information and Security Officers) have to track them 24x7," noted the study.

Emergence of the new 'Internet of Everything', like connected cameras, cars, health and industrial automation devices proves to be a launch pad for the "hacking for hire" industry.

"Cyber security is becoming a priority for businesses. It has become critical to identify risks near real-time and empower stakeholders to take actions and decisions based on priority," said the IT major in a statement citing the study report.

The Internet of Things (IoT) devices come with a low memory and processing footprint and have little security capabilities, including patching. Once "online" with an IP address, the devices are easy prey for hacking syndicates, who develop custom malware to take their control en masse and use them as a launch pad for cyber-attacks.

Noting that responsibility for governance of data privacy was still centralised, lying with cyber officers for 71 per cent of enterprises, the report said privileged access to data was ranked the highest amongst data security controls.

The report also highlighted key findings on attacks, vulnerabilities and cyber defence useful for teams across cyber security strategy, operations and risk management.

"The report brought a mix of research and analysis on attacks, vulnerabilities, and cyber weapons and contrasts their impact on defence mechanism," said Sheetal Mehta, Wipro's Vice-President for cyber-security and risk services, in the statement.

The study was conducted in 11 countries across North America, Europe, Asia-Pacific, West Asia and South Asia interviewing 139 organisations in diverse industry sectors.

--IANS

fb/vgu/dg

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

image
Business Standard
177 22