May 23, 2018 By Shane Schick 2 min read

Eighty-five percent of security professionals believe cybersecurity threats will lead to an attack on major critical infrastructure over the next five years, according to a recent survey. The annual Pwnie Express study, The Internet of Evil Things, polled approximately 500 security professionals about a range of cybersecurity threats, including malware and devices connected as part of the Internet of Things (IoT).

Cybersecurity vs. Online Evil

The research looked at the variety of industry sectors that might be least prepared for an attack. Health care topped the list at 51 percent — but was followed closely by the waste and wastewater sectors (47 percent) and the energy sector (43 percent).

Security professionals may be predicting major attacks on critical infrastructure because they’re already dealing with so many issues in their own organizations. Malware attacks affected 59 percent of those polled, for example. Additionally, 32 percent were impacted by ransomware. More serious cybersecurity threats — specifically distributed denial of service (DDoS) attacks — struck 30 percent.

Security Professionals Still Lack the Right Tools

Perhaps more worryingly, security professionals suggested they aren’t necessarily strengthening their defenses — even after grappling directly with some of the most serious cybersecurity threats. While WannaCry affected 21 percent of those surveyed, for instance, approximately 18 percent said they still lack the tools to deal with the ransomware cryptoworm. Fourteen percent weren’t sure one way or the other. There were similar findings about other well-known malware and ransomware strains, including NotPetya, Locky and Mirai.

The gaps between the risks and the capability to deal with them weren’t limited to specific malware — it spread to entire areas of data protection. While a majority of 80 percent said they are concerned about cybersecurity threats as a result of bring-your-own-device (BYOD) policies in the workplace, less than half said they had real-time monitoring tools for personal devices.

About the same percentage said they were worried about the risk inherent in IoT-connected smart devices, but only 23 percent claimed to be keeping track of such devices effectively. Overall, while 64 percent said they are more concerned about the security of connected devices than they were last year, the authors said there was no improvement in the frequency at which they’re checking them.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today