October 6, 2014 By Douglas Bonderud 2 min read

The goal of any cybersecurity plan is to stop malicious attacks, but according to a recent survey, most companies still miss the mark when it comes to protection, detection and mitigation. The U.S. State of Cybercrime Survey was recently sponsored by PricewaterhouseCoopers (PWC), the Community Emergency Response Team at Carnegie Mellon University, CSO Magazine and the U.S. Secret Service. The survey’s findings beg the question: Where’s the disconnect?

Forest for the Trees

Information technology (IT) professionals are well aware of the security threats posed by technologies such as cloud computing, the bring-your-own-device (BYOD) trend and socially engineered phishing attacks. However, according to CSO Online, this kind of focus can be risky.

“You’ll often see organizations spend to secure [against] the current big threat but not focus on building a sustainable security program,” said John Pescatore of the SANS Institute.

In other words, the presence of a readily identifiable threat such as Heartbleed, Bash or the new Spike distributed denial-of-service (DDoS) toolkit spurs in-the-moment action, but this doesn’t always carry over to long-term security. By the numbers? Only 38 percent of organizations are able to focus investments on actual risks and repercussions rather than careening from crisis to crisis.

The results are costly; last year, average breaches ran over $400,000. What’s worse is that only one-third of respondents could even estimate these losses. Legal challenges, such as the class-action suit against Community Health Systems after its recent breach, add to this total and damage public perception, putting future revenue at risk.

Keeping Pace

According to PWC’s 17th Annual Global CEO Survey, 69 percent of CEOs are worried that cyberthreats will impact their growth. However, cloud offerings and mobile device controls are growing at a breakneck pace. Paula Tolliver of Dow Chemical points out the real risk, saying these technologies “are moving so quickly that IT security technologies can’t keep up.” Right now, it’s a question of reach exceeding grasp; companies know they need to leverage tech innovations to stay current, but cybercriminals are a step ahead.

Consider BYOD: Only 38 percent of survey respondents said their organization encrypted mobile devices, and less than half had a plan to respond in the event of an insider breach. Cloud computing, meanwhile, is entering a more mature market phase, prompting its own unique problems. Just two years ago, 54 percent of companies had a plan in place to vet third-party cloud security; last year, only 44 percent did the same.

Cybercrime Survey: Share and Share Alike

While the survey results aren’t exactly encouraging, there’s still hope, and it starts with information sharing. Historically, companies have been hesitant to disclose the existence of a breach, let alone specific details. However, that’s changing with the rise of Information Sharing and Analysis Centers that focus on “what” rather than “who” and use aggregate data to develop effective, long-term strategies.

In fact, cybercrime survey participants reported that the best way to detect criminal activity was through the use of an incident response team rather than individual effort. On a global scale, meanwhile, even police agency INTERPOL hopes this kind of collaboration will prove useful; opening this year, the INTERPOL Global Complex for Innovation wants to give law enforcement officials “real-time access to information beyond their own borders.”

Companies aren’t hitting the mark when it comes to cybersecurity, but it’s not all doom and gloom. The rise of real-time information sharing and collaboration over stony silence and crisis-to-crisis management offers a new avenue for proactive rather than reactive IT defense.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today