Site icon Information Security Buzz

It Only Takes One Hour to Detect APTs on Network, Apparently

Detect APTs on Network

Survey reveals unmanaged credentials are the biggest security issue for organisations and IT professionals are unrealistic about time it takes to identify threats

A new survey from Lieberman Software Corporation has revealed that 83 percent of IT professionals do not believe advanced persistent threats are over-hyped, however they are still very naïve about the length of time it would take to identify an advanced persistent threat on their own corporate network.

The study was carried out at Black Hat Conference 2015 and looked at the attitudes of nearly 150 IT security professionals. It revealed that 10 percent of IT professionals believe it would take them only one hour to identify an APT on their network, while 55 percent said it would take them one week to one month. However this is in contrast with data from a recent Mandiant report which revealed that hackers are present on the network for an average of 205 days before being discovered.

Other findings from Lieberman Software’s study revealed that 84 percent of respondents believe that unmanaged privileged credentials are the biggest cyber security vulnerability within their organisation.

Commenting on the study findings, Philip Lieberman, CEO of Lieberman Software Corporation, said: “Today’s sophisticated cyber attacks are designed to stay under the radar. Organizations must have security inside the firewall for when these difficult to detect attacks slip by perimeter defenses. That’s why it’s encouraging to see that IT professionals understand the dangers of unmanaged privileged credentials. Despite the prevalence of cyber attacks, and the difficult task of stopping them, malware and APTs do have a weakness. To be able to do their worst, they need privileged credentials to gain elevated access to a system. Ultimately, if they can’t install something, they can’t attack.”

Other findings from the study revealed that many IT professionals are still very dubious about the cloud, with 97 percent of respondents stating that they are worried about some of their organization’s cloud hosted data being either lost, corrupted or accessed by unauthorized individuals.

“Generally speaking, the security provided by cloud services is often superior to that which is implemented by most small and medium sized businesses. However what concerns most organisations is the security of their critical data. Cloud service providers need to demonstrate how seriously they take cyber security and the lengths they are going to in order to protect sensitive information against access by unauthorized individuals. Organisations should always keep a close eye on all their cloud hosted data and keep a log of who is accessing the data and when. This will help ensure it is not accessed by anyone it shouldn’t be,” continued Lieberman.

[su_box title=”About Lieberman Software” style=”noise” box_color=”#336588″]Lieberman Software proactively stops cyber attacks that bypass conventional enterprise defenses and penetrate the network perimeter. The company provides award-winning privilege management and security management products to more than 1,400 customers worldwide, including nearly half of the US Fortune 50. By automatically securing privileged access – both on-premises and in the cloud – Lieberman Software controls access to systems with sensitive data, and defends against malicious insiders, zero day attacks and other advanced cyber threats. Lieberman Software is headquartered in Los Angeles, CA, with offices and channel partners located around the world.[/su_box]

About the Author

Exit mobile version