dcsimg
 
 
 
 
 
 

Password Cracking Tops IT’s Security Concerns

 
 
By Karen A. Frenkel  |  Posted 06-09-2015
 
 
 
 
 
 
 
 
 
  • Previous
    Password Cracking Tops IT’s Security Concerns
    Next

    Password Cracking Tops IT’s Security Concerns

    By Karen A. Frenkel
  • Previous
    Password Cracking Prevails
    Next

    Password Cracking Prevails

    Of the tested types of threats, the one experienced during the last three months by the most respondents (25%) is password cracking.
  • Previous
    Recent Password Cracking Incidents
    Next

    Recent Password Cracking Incidents

    24.7% of respondents have experienced password cracking during the last six months or less, 22% experienced DDoS attacks, 21% experienced man-in-the-browser, 19.7% suffered DNS poisoning, and 18% experienced demand-in-the-middle attacks.
  • Previous
    Attacks Equally Hard to Detect
    Next

    Attacks Equally Hard to Detect

    According to respondents, all the investigated types of attacks are equally hard to detect and mitigate. Nevertheless, Advanced Persistent Threats (APTs) have an edge: One-fifth of mid-size companies mentioned them.
  • Previous
    Ranking of Attacks
    Next

    Ranking of Attacks

    Asked to rank attacks by difficulty of detection and mitigation, respondents answered as follows: APT: 19.7%, Ransomware: 13.7%, Spear Phishing: 13.7%, Rootkits: 13.3%, BYOD: 11.3%
  • Previous
    Firewall and Anti-virus/Malware
    Next

    Firewall and Anti-virus/Malware

    One-third of companies use firewalls followed by anti-virus/malware. They also favor protection that limits the impact while security solutions are used.
  • Previous
    Firewall Overall Use
    Next

    Firewall Overall Use

    The top five reasons companies use firewalls are: Anti-virus and malware: 70.3%, Firewall: 67.7%, Data Protection: 51.3%, Intern Filtering: 36%, Device or Port Control: 26.7%
  • Previous
    Custom Software by Attack Type
    Next

    Custom Software by Attack Type

    The top five types of attacks companies fight with the help of custom software are: Advanced Persistent Threat: 55.7%, Spear Fishing: 52.3%, DNS poisoning: 51.7%, Zero-Day vulnerability: 51%, Ransomware: 47.7%
  • Previous
    Consequences of Attacks
    Next

    Consequences of Attacks

    Time spent, either with the help desk or in-house IT support, and employee productivity are the areas most highly impacted by attacks.
 

Companies experienced password cracking the most of all cyber-threats during the last three months, according to a new survey. The study, "U.S. Companies' Experience and Attitudes Towards Security Threats," was conducted by antivirus and security software firm Bitdefender and market researcher MillwardBrown. Technology officers at mid-size and large businesses in the United States participated online in early April. Thirty-eight percent are IT managers/IT directors, 16 percent are CIOs, 13 percent are IT officers and 10 percent are vice presidents of IT. They are either the final decision-maker or influence decision-making processes in procuring equipment, such as PCs, laptops, tablets, software solutions, servers and storage solutions and endpoint security solutions. "Zero-day exploits have traditionally been perceived as the most serious threat to the enterprise. They have been successfully used for covert infiltration in military-grade networks and have played a huge role in the deployment of the world's most spectacular APTs. Fast forwarding to 2015, IT managers' most-pressing issue becomes ransomware, a commercial-grade threat that threatens data availability and business continuity," said Bogdan Botezatu, senior e-threat analyst at Bitdefender.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that cioinsight.com may send you cioinsight offers via email, phone and text message, as well as email offers about other products and services that cioinsight believes may be of interest to you. cioinsight will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit