There is no 'if' you will be attacked, only 'when'
Chris Christiansen, Program Vice President Security Products and Services, IDC.
It’s obvious that cyber-crime is no longer just fodder for futuristic, suspenseful movie plots, such as War Games or Sneakers. The future is here. And though we may not be Bruce Willis saving the US financial system from cyber-terrorists, we are all obligatory players in what is quickly becoming an online battlefront.
Today, Trustwave released their 2013 Global Security Report, analyzing more than 450 incident response investigations, along with data from two million vulnerability scans, 400 web-based data breaches, and more than 20 billion e-mails. The threat to each and every business is undeniably real, with cyber security threats, “increasing as quickly as businesses can implement measures against them.” Although Retail and Food and Beverage organizations were the primary target, Trustwave found that, “nearly every industry, country and type of data was involved in a breach of some kind.” Welcome to the War of the Cyber World.
It’s no surprise that in this ongoing battle, remote access was again the number-one method of infiltration for data breaches in 2012, accounting for 47% of the analyzed attacks. Gaining unauthorized control of a remote access solution allows almost limitless possibilities to any hacker. And with many businesses outsourcing some or all of their IT operations, the risks are even greater. The Trustwave report found that in 63% of the incidents investigated, a major component of IT support was outsourced to a third-party vendor.