70% of organizations are compromised by encryption attacks: Research

News Desk -

Share

Vectra AI, a provider of Security AI-driven hybrid cloud threat detection and response, has published a report entitled “The Evolving Role of Network Detection and Response (NDR).” It explains why today’s security teams are finding it increasingly difficult to detect and stop cyber threats aimed at their organizations. According to the study, 70% of organizations have been the victim of an attack that used encrypted traffic to avoid detection. Almost half (45%) said they had been a victim multiple times. Worryingly, two-thirds (66%) still lack visibility into all encrypted traffic, leaving them vulnerable to additional encrypted attacks.

“Organizations face a barrage of threats on all fronts — in their network, cloud and IT environments — while cybercriminals use techniques like encryption to breach firms undetected. What’s more, many don’t have the skills or staff to deal with increasing security workloads,” comments Mark Wojtasiak, VP Product Strategy at Vectra. “To stem the tide against them, security teams need total visibility into their environments, so they can spot the signs of an attack before it becomes a breach. By empowering analysts with AI-driven Attack Signal IntelligenceTM, organizations can prioritize otherwise unknown and urgent threats that pose the greatest risk to the business. This improves analyst throughput by reducing alert noise, and arms them to reduce risk and keep organizations safe.”

According to the report, cybersecurity and networking professionals are struggling to keep up with rapidly increasing threat detection and response workloads, preventing analysts from dealing with sophisticated threats. Among the major findings are:

  • 45% of cybersecurity and networking professionals feel threat detection and response workloads have increased – 40% citing more resources in the cloud, and 36% more devices on the network 
  • 37% believe sophistication of threats has increased making it difficult for analysts to spot legitimate attacks
  • 69% agree that the lag between exploitation and detection gives attackers too much time to breach a network – with 29% also citing communication issues between SOC and other IT teams
  • 23% believe SOC analysts do not have the right level of skills, and one-in-five (18%) believe they’re understaffed – suggesting security analysts are not equipped to deal with the scale of cyberattacks they face

60% of SMBs feel threat detection and response is now harder – showing smaller organizations are struggling to keep pace with the evolving cybercrime landscape


Leave a reply