IT disaster recovery, cloud computing and information security news

A recent survey by Ponemon Institute, commissioned by SolarWinds MSP, looked at senior security executives’ awareness of and readiness for increased malware and ransomware threats. The study asked 202 senior-level security executives in the US and UK about emerging security threats. Specifically, the study addressed those propagated by the ‘Vault 7’ leaks, and the more massive global WannaCry and Petya ransomware attacks fueled by the ‘EternalBlue’ Shadow Brokers leak.

The survey revealed that while most agree that attacks are increasing, they are confused about what threats pose the most risk and lack the means to defend against them. Most respondents did not think their organization had the budget or technology to deal with cybersecurity threats:

  • Just 45 percent said that they had the technology to prevent, detect, and contain cybersecurity threats, while only 47 percent felt that they had enough budget to cope.
  • The survey found that while a majority (69 percent) of respondents had a high awareness of both WannaCry and Petya threats, they were far less aware of the potential of Vault 7 threats, with the highest level of awareness at 30 percent.

The number of attacks that businesses had detected was potentially even more worrying than the confusion over risk:

  • A majority (54 percent) of security executives admitted that their business had experienced an attack in the last year. Of those, almost half (47 percent) had been unable to prevent the attack.
  • The result of these successful cyberattacks included the theft of data assets (52 percent), the disruption to business process (47 percent), and IT downtime (41 percent).

The survey also revealed that businesses do not feel prepared to prevent attacks:

  • 29 percent said that they would be unable to prevent a Petya attack and 28 percent would be unable to prevent a WannaCry attack.
  • Businesses are even less prepared for Vault 7 exploit attacks, with only 9 percent ready to prevent exploits of Vault 7 threats like Dark Matter or After Midnight.

Another key finding was the lack of remediation:

  • 44 percent of respondents who were aware of the WannaCry patch didn’t implement it.
  • 55 percent didn’t patch for Petya.

“The lack of knowledge among senior-level security executives is worrying—they know that attacks are on the increase, but many don’t know what they are and seem unable to effectively prevent them,” said Larry Ponemon, Founder, Ponemon Institute. “Better use needs to be made of the resources available, such as US CERT alerts, and the service providers that most businesses are using to outsource protection. Those providers also need to step up and provide education on where most attacks are coming from and how they can be prevented.”

“There is a role for managed service providers (MSPs) to play based on this research, by supporting companies as they navigate the ever-evolving security threats businesses face,” said Tim Brown, VP of security architecture, SolarWinds MSP. “It’s a bit like the wild west now, as we saw from the widespread fallout from WannaCry and Petya, and may still see from Vault 7 if those leaks are more widely exploited. Indeed, we have no crystal ball to know what threats lie on the horizon. Businesses need help with everything from awareness to technology to specialized staff. This study supports a view that MSPs have a unique opportunity to expand their security offerings to meet this need by filling gaps that can’t be easily filled in house.”

The full report is available for download here (registration required).

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.