The most important things that Cisco reported in an e-security report 2018

0

The development of malware is on the rise as hackers begin to turn cloud services into weapons that serve their attacks. An e-security report 2018 shows how they also benefit from hiding their activities and strengthening their attacks in time and force. Security experts say they continue to use tools that use artificial intelligence and automated learning and spend more time and deal with them, according to Cisco’s annual report on e-security 2018.

Cisco researchers have noted threats of up to three times the amount of coded network connections used in malware samples that they were able to detect in a 12-month period.

- الإعلانات -

 

The most important thing Cisco reported in an e-security report 2018
 

The financial costs of the attacks have become a reality, not virtual numbers
More than half of the attacks have caused more than half a million US dollars worth of damage, including, but not limited to, losses of revenue, customers, opportunities and costs paid.

Attacks on the supply chain are becoming faster and more complex
These attacks can affect computers on a large scale so that they can last for months or even years. Defenders must be aware of the potential risks of using software or hardware in institutions with an unfavorable security situation.

E-security becomes more complex while security penetration expands
Network security professionals apply a complex mix of products provided by a range of providers to protect against security breaches, but the increasing complexity and growth of hacking have a significant impact on the organization’s ability to defend against attacks, such as the increased risk of loss.

– In 2017, 25 percent of security experts said they used products from 11 to 20 different suppliers, compared to 18 percent of security experts in 2016.

– E-security experts said 32 of the hackers affected more than half of their systems, compared with 15 percent in 2016.

Security experts see the value of behavioral analysis tools in determining attackers’ locations on networks

Where 92 per cent of security experts said that behavioral analysis tools were doing well, while two-thirds of health workers, followed by the financial services sector, said behavioral analysis was very useful in identifying hostile parties.

The growing use of cloud infrastructure exploits the low security progress
In this year’s survey, 27 percent of security experts said they use private cloud infrastructure outside their corporate buildings, compared with 20 percent in 2016. Fifty-seven percent said they hosted networks in cloud infrastructure because data security was superior, while 48 percent said the reason was Scalability, with 46 percent citing ease of use.

Directions

Cisco’s threat detection time was 4.6 hours between November 2016 and October 2017, well below the 39-hour median time in November 2015 and the 14-hour time, according to Cisco’s 2017 Annual Security Report for the period from November 2015 to October 2016 “The use of cloud security is a key factor in helping Cisco strengthen its ability to keep the median time for detecting threats at low levels, as the speed of time required to detect threats helps defenders to move quickly and deal with intrusions.

تعليقات
انتظر...