Sergey Nivens - Fotolia
IT professionals in the US are overconfident in their ability to detect a data breach, a study of more than 760 IT professionals across four industry sectors revealed.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Most respondents expressed high levels of confidence in seven key security controls required to detect cyber attacks on endpoints – but many were unsure how long it would take automated tools to discover key indicators of compromise.
More the two thirds of those polled on behalf of security firm Tripwire admitted they only had a general idea, were unsure or did not use automated tools.
However, regarding how long it would take to detect a configuration change to an endpoint on their organisations’ networks, 71% believed it would happen in minutes or hours.
Nearly half of energy and health care respondents said they had the lowest percentage of successful patches in a typical patch cycle, with a success rate of less than 80%.
Almost two thirds of respondents were unsure how long it would take for automated tools to generate an alert if they detected an unauthorised device on the network; while 23% said that 90% of the hardware assets on their organisations’ networks are automatically discovered.
Nearly half of respondents working for federal government organisations said not all detected vulnerabilities are remediated in 15 to 30 days.
Just over two fifths of midmarket organisations do not detect all attempts to access files on local systems or network-accessible file shares by users who do not have the appropriate privileges.
Read more about security automation
- The rapid growth of new Android malware calls for automated tools to help malware analysts.
- Some companies are investing in the capability to aggregate data from all their security tools and intelligence feeds to orchestrate and automate their incident response processes.
- Visibility and automation are key areas of cyber security innovation, but firms should concentrate first on the basics and not overlook the human element of security.
Managers miss key information
The survey found 61% of respondents working in the financial services sector said their automated tools do not pick up all the information necessary to identify the locations, departments and other critical details about unauthorised configuration changes to endpoint devices.
“All of these results fall into the ‘we can do that, but I’m not sure how long it takes’ category,” said Tim Erlin, director of IT security and risk strategy for Tripwire.
“It’s good news that most organisations are investing in basic security controls, however IT managers and executives – who don’t have visibility into the time it takes to identify unauthorised changes and devices – are missing key information necessary to defend themselves against cyber attacks.”
These regulations and frameworks recommend:
- Accurate hardware and software inventory;
- Continuous configuration management and hardening;
- Comprehensive vulnerability management;
- Patch and log management;
- Identity and access management.
These controls are aimed at delivering specific, actionable information necessary to defend against the most pervasive and dangerous cyber attacks, including nation-state sponsored attacks.
Rapid action limits damage
Erlin said it was vital for organisations to identify indications of compromise quickly, so that appropriate action can be taken before any damage is done.
According to Mandiant’s M-Trends 2015 report, the average time required to detect an advanced persistent threat on a corporate network is 205 days. In addition, Verizon’s 2015 Data Breach Investigations Report revealed that two thirds of targeted attacks generally took months to detect.