Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Data Security
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
No. 1 IT Security Worry:
No. 1 IT Security Worry: 'Hacktivists' Like Anonymous

By Barry Levine
April 24, 2012 11:16AM

Bookmark and Share
A report by security firm Bit9, titled 2012 Cyber Security Research, found that 64 percent of the 2,000 IT security experts surveyed expected their organization to be the target of a cyber-attack within the next six months, with "hacktivists" like Anonymous the main threat, followed by cyber-criminals and nation-states.
 



What is the No. 1 security worry for IT professionals? According to a new report, it's "hacktivists" from Anonymous.

The new survey by security firm Bit9, titled 2012 Cyber Security Research, finds that cyber-criminals and nation-states take second and third place among the top three worries. The survey queried nearly 2,000 IT security experts in the U.S. and Europe about the current state of enterprise security.

China, Russia

Sixty-one percent of those surveyed said Anonymous and other hacktivist groups are most likely to target their organizations, with 55 percent believing that cyber-criminals will hit them and 48 percent fearing attacks by nation states.

The report found that 64 percent of respondents expect their organization to be the target of a cyber-attack within the next six months. Among those that fear nation-states, China is the main concern, followed by Russia.

Harry Sverdlove, Bit9's chief technology officer, said in a statement that the survey "highlights how the quickly changing criminal landscape is impacting IT professionals worldwide."

An overwhelming 74 percent of respondents believe that their security measures on employees' machines are not doing enough to protect against these threats. But, while endpoints -- laptops and desktops -- are considered the weakest link, 40 percent of respondents felt that infrastructure servers had the most effective security and 36 percent felt that way about file servers -- in spite of the fact that servers are frequent targets.

Role of Employees

Disgruntled employees, long considered a security threat, are seen by only 28 percent as a concern for their companies.

Fifty-eight percent said implementation of best practices and better security policies are the best ways to improve security in the enterprise, and 19 percent said individual employees could play "an important role" in improving security.

Forty-five percent see malware as the main attack method, including Trojans and rootkits, while 17 percent are most worried about "spear phishing," in which the source of a malicious e-mail appears to come from someone within the company. Although hacktivist attacks were the most worrisome, only 11 percent were concerned about one of the most common methods from those attackers, denial of service, and only 4 percent were worried about SQL injection.

When a breach does occur, an overwhelming 95 percent of those surveyed said that customers and the public should be notified. Nearly half, or 48 percent, said that the notification should include a description of what was taken, and 29 percent said that a description of how the attack took place is also warranted. Six percent felt the company had no obligation to disclose anything.

Charles King, an analyst with Pund-IT, said that many IT departments see security threats as much more organized these days, and that many of them come from parts of the former Soviet Union -- especially threats involving identity fraud for financial gain.

He said it appeared that many of the attacks from China are focused on state and corporate secrets, and that, "since the Internet is so tightly controlled there, it's hard to imagine that the Chinese government is not complicit."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Data Security
1.   Tor Working To Fix Security Exploit
2.   Protect Yourself from Identity Theft
3.   Hackers Breached StubHub Accounts
4.   Juniper DDoS for High-IQ Networks
5.   Google Hacker Team to Hunt Bugs


advertisement
Protect Yourself from Identity Theft
Even if your data was compromised.
Average Rating:
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:
Gartner Rates IT Security Companies
IBM, HP, McAfee, Splunk ranked well.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 

Mobile Technology Spotlight
Android 'Fake ID' Puts Millions of Users at Risk
Having this fake ID is nothing to brag about, even if you are a minor. The “Fake ID” Android flaw drops malware into smartphone apps. It can steal credit card data and even take over your device.
 
FTC Wants Fix for 'Perfect Scam' of Mobile Cramming
The U.S. Federal Trade Commission has issued new guidelines to curb “mobile cramming,” a troublesome practice that adds unauthorized third-party charges to mobile phone bills.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.