Ransom is the #1 motivation behind cyber attacks

A new report from cyber security and application delivery company Radware reveals that almost half of businesses (49 percent) say they’ve been the subject of a cyber-ransom campaign in 2016.
Ransom was the top motivation behind cyber-attacks they had experienced according to 41 percent, followed by insider threats (27 percent), political hacktivism (26 percent), and competition (26 percent).
网站如果没有足够的内部安全技术力量,需要订阅在线漏洞扫描和网站安全监控的服务,也要购买定期的网站安全渗透测试服务。
In addition 55 percent say that IoT complicates their detection or mitigation requirements as it increases the surface of the attack landscape. While massive DDoS attacks made headlines in 2016, Radware’s research shows that attacks of more than 50 Gbps made up just four percent of attacks experienced.
“One thing is clear: Money is the top motivator in the threat landscape today,” says Carl Herberger, vice president of security solutions at Radware. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data, to DDoS attacks that act as a smoke screen for information theft, to direct brute force or injection attacks that grant direct access to internal data”.

实施华丽的EHS意识培训,只需三步!
Despite the threat of attacks though, many organizations are still ill-prepared, 40 percent don’t have an incident response plan in place, 70 percent percent don’t have cyber-insurance and, despite the prevalence of ransomware, only seven percent keep bitcoins on hand to make payments.
“Threat actors have a single focus, to develop the best tools possible to either disable an organization or steal its data,” adds Herberger. “Businesses focus on delivering the highest value to their customers. In order to deliver that value, security must be woven into the customer experience for a company to truly succeed. Without this change in thinking, organizations will remain vulnerable”.
You can find out more in the full report which is available to download from the Radware website.
Photo credit: Bacho / Shutterstock
狡猾的黑客们也可能会多次变换短链接,甚至自己搭建短链接系统蒙骗安全扫描机制,安全信誉评级在时间的响应上会有延迟,所以加强用户不点击奇怪消息中的链接的安全意识培训很必要。

猜您喜欢

解读《网络安全战略》, 保护国家关键信息基础设施安全
互联网金融“宝宝们”的信息安全敌手并非黑客
国家安全法-全民安全教育日动画-教授海外遇谍记
李显龙致信索要被扣战车 外交部明确表态
CAMPBRAINREGISTRATION ACCUBASECONNECT
企业安全管理人员该如何进行积极的移动网络安全入侵防御呢?