WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

2014 Global Threat Intelligence Report

NTT Innovation Institute has announced the release of the 2014 NTT Group Global Threat Intelligence Report (GTIR). The report focuses on five critical areas of security: threat avoidance, threat response, threat detection, investigative and response capabilities. A key portion of the report is aimed at business and security leaders concerned with balancing cost and risk. Recommendations and strategies for minimising the impact of threats and reducing the threat mitigation timeline are conveyed in multiple charts and real-world case studies.

Key findings include:

  • The cost for a 'minor' SQL injection attack exceeds $196,000: organizations must realise the true cost of an incident and learn how a small investment could reduce losses by almost 95 percent.
  • Anti-virus fails to detect 54 percent of new malware collected by honeypots: additionally, 71 percent of new malware collected from sandboxes was also undetected by over 40 different anti-virus solutions. This supports the premise that simple endpoint solutions must be augmented with network malware detection and purpose-built solutions.
  • 43 percent of incident response engagements were the result of malware: missing anti-virus, anti-malware and effective lifecycle management of these basic controls were key factors in a significant portion of these engagements.
  • Botnet activity takes an overwhelming lead at 34 percent of events observed: almost 50 percent of botnet activity detected in 2013 originated from US based addresses. The fact that healthcare, technology and finance account for 60 per cent of observed botnet activity reflects the information worker burden that accompanies these industries.
  • PCI assessed organizations are better at addressing perimeter vulnerabilities: organizations performing quarterly external PCI Authorised Scanning Vendor (ASV) assessments have a more secure vulnerability profile, as well as a faster remediation time (27 percent), than organizations performing unregulated assessments.

The GTIR was developed using threat intelligence and attack data from the NTT Group companies - Solutionary, NTT Com Security, Dimension Data, NTT Data and support from NTT R&D. The key findings in the GTIR are a result of the analysis of approximately three billion worldwide attacks over the course of 2013. The data analysed for this report was collected from 16 Security Operations Centers (SOC) and seven R&D centres with more than 1,300 NTT security experts and researchers from around the world.

To access the full report, please visit: www.nttcomsecurity.com/gtir

•Date: 1st April 2014 • World •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here