October 6, 2014 By Douglas Bonderud 2 min read

The goal of any cybersecurity plan is to stop malicious attacks, but according to a recent survey, most companies still miss the mark when it comes to protection, detection and mitigation. The U.S. State of Cybercrime Survey was recently sponsored by PricewaterhouseCoopers (PWC), the Community Emergency Response Team at Carnegie Mellon University, CSO Magazine and the U.S. Secret Service. The survey’s findings beg the question: Where’s the disconnect?

Forest for the Trees

Information technology (IT) professionals are well aware of the security threats posed by technologies such as cloud computing, the bring-your-own-device (BYOD) trend and socially engineered phishing attacks. However, according to CSO Online, this kind of focus can be risky.

“You’ll often see organizations spend to secure [against] the current big threat but not focus on building a sustainable security program,” said John Pescatore of the SANS Institute.

In other words, the presence of a readily identifiable threat such as Heartbleed, Bash or the new Spike distributed denial-of-service (DDoS) toolkit spurs in-the-moment action, but this doesn’t always carry over to long-term security. By the numbers? Only 38 percent of organizations are able to focus investments on actual risks and repercussions rather than careening from crisis to crisis.

The results are costly; last year, average breaches ran over $400,000. What’s worse is that only one-third of respondents could even estimate these losses. Legal challenges, such as the class-action suit against Community Health Systems after its recent breach, add to this total and damage public perception, putting future revenue at risk.

Keeping Pace

According to PWC’s 17th Annual Global CEO Survey, 69 percent of CEOs are worried that cyberthreats will impact their growth. However, cloud offerings and mobile device controls are growing at a breakneck pace. Paula Tolliver of Dow Chemical points out the real risk, saying these technologies “are moving so quickly that IT security technologies can’t keep up.” Right now, it’s a question of reach exceeding grasp; companies know they need to leverage tech innovations to stay current, but cybercriminals are a step ahead.

Consider BYOD: Only 38 percent of survey respondents said their organization encrypted mobile devices, and less than half had a plan to respond in the event of an insider breach. Cloud computing, meanwhile, is entering a more mature market phase, prompting its own unique problems. Just two years ago, 54 percent of companies had a plan in place to vet third-party cloud security; last year, only 44 percent did the same.

Cybercrime Survey: Share and Share Alike

While the survey results aren’t exactly encouraging, there’s still hope, and it starts with information sharing. Historically, companies have been hesitant to disclose the existence of a breach, let alone specific details. However, that’s changing with the rise of Information Sharing and Analysis Centers that focus on “what” rather than “who” and use aggregate data to develop effective, long-term strategies.

In fact, cybercrime survey participants reported that the best way to detect criminal activity was through the use of an incident response team rather than individual effort. On a global scale, meanwhile, even police agency INTERPOL hopes this kind of collaboration will prove useful; opening this year, the INTERPOL Global Complex for Innovation wants to give law enforcement officials “real-time access to information beyond their own borders.”

Companies aren’t hitting the mark when it comes to cybersecurity, but it’s not all doom and gloom. The rise of real-time information sharing and collaboration over stony silence and crisis-to-crisis management offers a new avenue for proactive rather than reactive IT defense.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today