8 key cybersecurity deficiencies and how to combat them
Posted on 29 May 2014.
While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations' cybersecurity capabilities do not rival the persistence and technological skills of their cyber adversaries.

According to the report, only 38 percent of companies have a methodology to prioritize security investments based on risk and impact to business strategy. The survey is a collaborative effort with PwC, CSO magazine, the CERT Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service.

"Cyber criminals evolve their tactics very rapidly, and the repercussions of cybercrime are overwhelming for any single organization to combat alone. It's imperative that private and public organizations collaborate to combat cybercrime and gain intelligence about security threats and how to respond to them. A united response will prove to be an indispensable tool in advancing the state of cybersecurity," said David Burg, PwC's Global and U.S. Advisory Cybersecurity Leader.

The U.S. Director of National Intelligence has ranked cybercrime as the top national security threat, higher than that of terrorism, espionage and weapons of mass destruction. U.S. business leaders in particular are increasingly worried about cybercrime—much more than their global counterparts. PwC's Annual Global CEO Survey 2014 found 69% of U.S. respondents reported they were worried about the impact of cyber threats to their growth prospects, compared with 49% of global CEOs.

The Cybercrime survey finds that the average number of security incidents detected over the past year was 135 per organization. Fourteen percent of respondents reported that monetary losses attributed to cybercrime have increased. The actual costs, however, remain largely unknown as more than two-thirds (67 percent) of those who detected a security incident were not able to estimate the financial costs. Among those that could, the average annual monetary loss was projected to be $415,000.

Key cybersecurity deficiencies:
  • Most organizations do not take a strategic approach to cybersecurity spending
  • Organizations do not assess security capabilities of third-party providers
  • Supply chain risks are not understood or adequately assessed
  • Security for mobile devices is inadequate and has elevated risks
  • Cyber risks are not sufficiently assessed
  • Organizations do not collaborate to share intelligence on threats and responses
  • Insider threats are not sufficiently addressed
  • Employee training and awareness is very effective at deterring and responding to incidents, yet it is lacking at most organizations.
To combat these deficiencies, PwC recommends that organizations can: invest in people and processes, in addition to technologies; hold third parties to the same or higher standards; assess risks associated with supply chain partners; ensure that mobile security practices keep pace with adoption and use of mobile devices; perform cyber risk assessments regularly; take advantage of information sharing internally and externally to gain intelligence on fast-evolving cyber risks; develop threat-specific policies; and, enhance training and create workforce messaging to boost cybersecurity awareness across the organization.

"Despite substantial investments in cybersecurity technologies, cyber criminals continue to find ways to circumvent these technologies in order to obtain sensitive information that they can monetize," said Ed Lowery, Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service. "The increasing sophistication of cyber criminals and their ability to circumvent security technologies indicates the need for a radically different approach to cybersecurity: A balanced approach that, in addition to using effective cybersecurity technologies, develops the people, processes, and effective partnerships in order to strategically counter cybersecurity threats."

This year, three in four (77 percent) respondents to the survey reported a security event in the past 12 months, and more than a third (34 percent) said the number of security incidents increased over the previous year. Additionally, 59 percent of respondents reported that they were more concerned about cybersecurity threats this year than they were the year before.

"Third-party and supply chain partners should be held to the same, if not higher, cybersecurity standard that companies set for themselves," said Randy Trzeciak, technical manager of the Insider Threat Center at CERT. "In particular, compliance should be mandated in contracts. Carefully assessing risks associated with partners and determining incident response plans are also essential elements."

"The severity of cyber threats will continue to intensify as threat actors evolve and sharpen their skills and techniques. If history—and responses to this survey—are a guide, more organizations will fall victim to more costly cybercrime in the coming year," commented Burg. "Organizations that take a strategic approach to cybersecurity spending can build a more effective cybersecurity practice, one that advances the ability to detect and quickly respond to incidents that are inevitable."





Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //