Home Business IT Security Survey: 1 in 5 organisations has experienced an APT attack
×

Warning

JUser: :_load: Unable to load user with ID: 3018

Survey: 1 in 5 organisations has experienced an APT attack

  • 14 February 2013
  • Written by 
  • Published in Security

Probably, the others just don't know that they have.

ISACA, a global provider of information system assurance and security, surveyed over 1,500 security professionals during the fourth quarter of 2012 to find that around one in five reported that their enterprise had been the victim of an advanced persistent threat (APT). Further, according to the survey, 94% of those respondents said that "APTs represent a credible threat to national security and economic stability, yet most enterprises are employing ineffective technologies to protect themselves."

ISACA has released the results of the survey to show that there is a still-growing threat.

"APTs are sophisticated, stealthy and unrelenting," said Christos Dimitriadis, international vice president of ISACA and head of information security at INTRALOT GROUP. "Traditional cyberthreats often move right on if they cannot penetrate their initial target, but an APT will continually attempt to penetrate the desired target until it meets its objective - and once it does, it can disguise itself and morph when needed, making it difficult to identify or stop."

The survey also noted that over 60% of survey respondents thought that it was merely a matter of time before their enterprise was targeted. Contrasting with the 53% who considered that APTs were no different to 'ordinary' threats. These numbers are rather confusing when linked with the fact that around 60% of those surveyed believed their organisations were prepared for an APT incident.

However, more concerning (especially amongst so-called security professionals) was the opinion amongst a vast majority of respondents that antivirus and antimalware along with network perimeter technologies such as firewalls were sufficient protection.

They're not.

"APTs call for many defensive approaches, from awareness training and amending third-party agreements to ensure vendors are well-protected, to implementing technical controls," said Jo Stewart-Rattray, director of ISACA and director of information security and IT assurance at BRM Holdich.

The organisation also calls for the recognition that APTs are entirely different to 'normal' threats. As one security expert recently told iTWire (and we paraphrase), "you're either being hit by APTs, or you simply don't know that you're being hit by APTs."

LEARN HOW TO BE A SUCCESSFUL MVNO

Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service

DOWNLOAD NOW!