• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Cyber Security Pros’ Heightened Concern over Potential Attacks

Updated on Aug 27, 2019 by Guest Authors

Security professionals are more concerned over cyber attacks and data breaches than 12 months ago, with many now worried that Meltdown Spectre attacks are becoming commonplace.

System ransomware main concern

Source: Pixabay

System ransomware and compromises are the main threats to companies, with 20 percent citing them as the No.1 concern, according to the International Cyber Benchmarks Index report from Neustar. Distributed Denial of Service (DDoS) attacks weren’t far behind, at 19 percent. Financial theft was 18 percent, and intellectual property attacks 17 percent. Respondents represented the US, Europe, Africa, and the Middle East.

Concerns over DDoS on the rise

Almost half of respondents (47 percent) have labeled DDoS a threat to their company, which is a 38 percent increase on figures from last year. An average of 40 percent of those who responded said that they have been made targets of DDoS attacks

Close to all of the firms polled (98 percent) have taken action towards minimizing risks associated with attacks designed to exploit vulnerabilities in the Meltdown and Spectre chip. A huge 90 percent said that they expect the attacks to become normalized. The reality remains, however, that these firms should be doing even more. All organizations, in fact, should be looking more towards preventative measures such as Web Application Firewalls (WAF), a managed service that fends off application layer attacks, such as zero-day threats and the OWASP Top 10.

No isolated incidents

The Changing Face of Cyber Attacks report, also from Neustar, assessed the damage caused by the largest-ever recorded DDoS attack and Memcached attacks. It reveals how the various types of modern threats, along with the high number of attacks, paints a bleak picture. The Neustar report also points out that the modern threat is rarely an isolated incident. A DDoS threat, for example, can divert attention from malware in one segment, while ransomware can hasten exfiltration of data in another.

The report asserts that we will see an increase in IPv6 attacks as organizations adopt the updated standard. Neustar fended off what is thought to be the very first IPv6 attack, which offered a new route that cybercriminals will likely pursue as a greater number of firms adopt IPv6 and run duel IPv4/IPv6 stacks, according to the report.

Compatibility issues

The report warned that running the two IPvs in parallel speeds doesn’t contribute towards consistent security. It added that it’s made even more complicated by the high number of security tools that are still incompatible with IPv6, or may be incorrectly configured, enabling cybercriminals to bypass intrusion preventing systems and generating malicious IPv6 traffic unrecognized by these controls.

The rising number of devices that comprise the Internet of Things (IoT) is assisting with the development of botnets, claimed the report. It explained that hackers can easily either rent or purchase these botnets, meaning that these threats rank among the biggest concerns for enterprises in the current climate.

Senior Vice President of Neustar, Rodney Joffe, said that, in order to prepare for a cyber attack, all organizations must assume that they’re the next target and that whether or not they are vulnerable depends on them.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

New iDPRT Printers – SP450, SP420, and Zeva 1966 Photo Printer Reviewed

Munbyn P44S Wireless Thermal Label Printer Review

Master & Dynamic MW75 Wireless Headphones Review – Get Lost in the Music

3DMakerPro Mole 3D Scanner Review – Affordable, Portable, and Easy To Use

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • New iDPRT Printers – SP450, SP420, and Zeva 1966 Photo Printer Reviewed
  • Munbyn P44S Wireless Thermal Label Printer Review
  • POLYWOOD Classic Folding Adirondack vs Member’s Mark Adirondack Chair – Which Is Better?
  • BLUETTI’s New Expandable Outdoor Solar Generator AC60 & B80

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}