Majority of IT Security Professionals Still Naively Rely on Perimeter Security to Protect Against APTs

A new survey from Lieberman Software Corporation has revealed that 78 percent of IT security professionals are confident that firewalls and anti-malware tools are robust enough to combat today’s advanced persistent threats. These findings highlight the fact that while cybercrime is on the rise, many organisations are still dangerously relying on outdated perimeter security solutions to defend against the latest threats.

The survey, which was carried out at Black Hat USA in August 2014, also revealed that 22 percent of those surveyed do not think that tools like firewalls and antivirus software packages are able to defend against APTs. However, given the surge in organisations suffering advanced targeted cyber attacks, this number should have been much higher.

Featured Download: Social media access at work. Do your employees know the rules?

Commenting on the survey findings, Philip Lieberman, CEO of Lieberman Software, said: “Our survey reveals that while the majority of organizations are prepared for amateur hackers and low-level criminals, they are completely ill-equipped to deal with today’s advanced attacks. Traditional perimeter security products are effective at spotting and stopping known threats, but they can’t keep up with today’s rapidly increasing volume of advanced targeted attacks. The most effective methods for securing yourself from these types of attacks are the use of air-gap networks (machines not connected to the internet) that disconnect systems with sensitive data. Assume that others have already penetrated your network and institute multi-factor authentication and adaptive privilege management to assure that a compromised system is not a jumping off point for an organization-wide attack.”

Cybercrime is undoubtedly at an all-time high, and in recent weeks there have been stories reported in the media about Russian cybercrime gangs infecting hundreds of thousands of PCs around the globe with malicious software used for stealing banking credentials and extorting computer owners. There have also been revelations around cybercrime gangs posting millions of passwords online. These stories should act as a warning to encourage organisations to implement proper defences which can cope with today’s advanced targeted attacks.

“The latest targeted cyber-attacks on government organizations and high-profile companies show the need for better awareness and responsiveness in cyber security. Organizations should no longer be solely dependent on perimeter security products, like firewalls and intrusion detection, to protect their systems. Today they need IT staff who are better trained to identify potential attacks and defense-in-depth security solutions that can restrict lateral movement in the network when attacks do manage to penetrate the perimeter,” continued Lieberman.

For more information, see: http://go.liebsoft.com/state-sponsored-attack-survey-2014.

About Lieberman Software Corporation

Lieberman_Software_logoLieberman Software provides award-winning privileged identity management products to more than 1200 enterprise customers worldwide, including nearly half of the Fortune 50. By automatically locating, securing and continuously auditing privileged accounts, both on-premises and in the cloud, Lieberman Software helps protect access to systems with sensitive data, thereby reducing internal and external security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. The company developed the first solution for the privileged identity management space, and its products, including Enterprise Random Password Manager (ERPM), continue to lead the market. Lieberman Software also provides a mature line of Windows security management tools. The company is headquartered in Los Angeles, CA, with offices and channel partners located around the world.

For more information, visit www.liebsoft.com

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x