Conclusion:
Your call to action

Detecting and responding to threats isn’t getting easier. A rising tide of known threats and the mainstreaming of cybercriminal activities have created an undercurrent of concern: Are we doing enough to defend against known threats? Where will the next threat come from?

The sheer volume of attacks detected by AT&T defenses each day is enough to give pause to any leadership team. But it’s important to remember what we told you at the beginning of our report: More than 90% of cyberattacks are known threats and, therefore, steps can be taken to help detect and prevent them by employing the right defensive measures.

Zero-day attacks are the ones that make headlines, but compared to the zettabytes of traffic flowing through countless networks each day, they are relatively uncommon. For cybersecurity and network professionals, it’s the common viruses, worms, and their variants that invade relentlessly. The lesson here: never let down your core defenses.

Persistent execution to counter the known threats that pose the greatest risk will help protect your business from intruders. Keep these core principles in mind:

Invest in a multilayered approach. A cyberaware organization effectively balances prevention, threat detection, and response to address the vast majority of known threats. This approach should also tightly integrate all aspects of your digital infrastructure — networks, systems, cloud-based services, and endpoint devices ranging from desktops to smartphones to smart devices connected via the IoT.

Reduce impacts from your weak links — employees and vendors. Employees and third-party vendors may not share your urgency or your diligence around good cybersecurity practices. Awareness and education programs are instrumental for your workforce to take accountability for their security. For contractors, business partners and vendors, clearly articulated policies and controls should be a requirement.

Keep your patches and software applications current. While most threats are known — with security protections available to help stop their attack — their variants can still threaten your organization. Keeping current on software patches and updates will help your organization avoid the dangers of software vulnerabilities.

Make cybersecurity foundational. Many organizations are undergoing comprehensive IT transformation efforts that involve moving to more flexible infrastructures utilizing cloud services and software-defined systems and networks. Make sure that security is a foundational component of these initiatives, so that your organization is positioned to be more agile and highly secure.

Adversaries are always looking for the next way into your organization. Your cybersecurity practices must be just as determined to keep them out.

The majority of cybersecurity threats are known. Defending against the known is a balanced, level-headed approach that better secures your organization.

Additional reading

About our survey

To gain a better understanding of the current global state of cybersecurity in large businesses and the current thinking behind security issues, AT&T commissioned a survey of business and IT decision-makers in July 2016. Respondents to the AT&T Market Pulse: Global State of Cybersecurity survey had to be director-level or above at companies with at least 1,000 employees. The self-administered survey returned more than 700 responses globally, covering a mix of functional areas and roles within the organization.

Endnotes and sources

  1. Fitzpatrick, D. and Griffin, D. (2016, April 15), Cyber-extortion losses skyrocket, says FBI.
  2. Kaspersky Lab assists in Russia’s largest cybercriminal arrest: The hackers who stole $45 million. (June 2016).
  3. AT&T. (2016). Market Pulse: The Global State of Cybersecurity
  4. ibid
  5. ibid
  6. National Crime Agency. (July 2016). Cyber Crime Assessment 2016.
  7. Yasin, R. (2016, Aug. 7). Cybercrime now surpasses traditional crime in UK.
  8. Kaspersky Lab assists in Russia’s largest cybercriminal arrest: The hackers who stole $45 million.
  9. Gudkova, D., et. al., (2016, May 12). Spam and phishing in Q1 2016.
  10. Rocha, L. (2015). Neutrino Exploit Kit Analysis and Threat Indicators, SANS Institute.
  11. Kaspersky Lab. Crypto-ransomware attacks rise five-fold to hit 718 thousand users in one year. (2016, June 22).
  12. Fitzpatrick, D. and Griffin, D.
  13. Constantin, L. (2016, June 27). Bart ransomware shows it can be effective without sophisticated encryption. PCWorld.
  14. Olenick, D. (2016, Aug. 26). Latest Locky version on the loose. SC Magazine.
  15. Fisher, M. (2016, July 26). Why security experts think Russia was behind the D.N.C. breach. The New York Times.
  16. Dennis, M.A. Denial of service attack (DoS attack).
  17. AT&T. (2016). Helping to Secure Education Networks.
  18. AT&T. (2016). Market Pulse: The Global State of Cybersecurity
  19. ibid
  20. Gartner says worldwide IoT security spending to reach $348 million in 2016. (2016, April 25).
  21. Underwood, M. (2016, May 30). Smart car, meet the smart city.
  22. Wong, C. (2015, Nov. 5). IDC’s 2016 predictions: IoT headed for huge growth (and security headaches).
  23. Saif, I., et.al. (2015, July 27). Safeguarding the Internet of Things: Being secure, vigilant, and resilient in the connected age.
  24. As cloud computing barriers fall, new challenges arise for organizations, new Comptia study concludes. (2014, Nov. 3).
  25. Big data universe beginning to explode. (2012).
  26. CSA survey finds trust in the cloud increasing. (2016, Feb. 8).
  27. Rashid, F. (2016, June 28). Cerber ransomware targets enterprises via Office 365.
  28. Check Point Research reveals threat of mobile malware persists as attacks targeting iOS devices increase. (2016, April).
  29. Duckering, B. (2016, July 11). Pokémon Go malware caught by Skycure.
  30. IDG Enterprise. (2016, Feb. 8). CIO/CSO Partnership Survey 2015. (2016, Feb 8).
  31. PWC. (2016 Jan.). Top issues: The promise and pitfalls of cyber insurance.
  32. Business e-mail compromise an emerging global threat. (2015, August 28).
  33. Ragan, S. (2016, March 24). Phishing attacks targeting W-2 data hit 41 organizations in Q1 2016.
  34. Find a flash drive, pick it up: experiment shows how lack of cybersecurity knowledge can impact organizations. (2015, Oct. 26).