Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Kaspersky Finds Patch Management Combined With Robust Password Policies Reduces The Risk Of Cyberattacks To Businesses By Up To 60%

New findings from Kaspersky reveals that, in six in ten (63%) cyberattacks investigated by the Kaspersky Global Emergency Response team, adversaries used password brute force and vulnerability exploitation as initial vectors to compromise the organization’s environment. Results from the company’s new Incident Response Analytics report demonstrate that simply implementing an appropriate patch management policy decreases the risk of incidents by 30%, and a robust password policy reduces the likelihood of being attacked by 60%.

Recommended AI News: OKEx launches NFT Marketplace and DeFi hub to accelerate NFT adoption in India

While the importance of regular patching and updates, as well as the use of strong passwords, is common knowledge for those who have even a little understanding of cybersecurity, these areas remain weak points in a large number of organizations and provide a way for adversaries to penetrate a company’s system. As a result, security issues with passwords and unpatched software combine into the overwhelming majority of initial access vectors during attacks.

Analysis of anonymized data from incident response (IR) cases1 shows that brute force is the most widely used initial vector to penetrate a company’s network. Compared to the previous year, the share of brute force attacks has jumped from 13% to 31.6%, likely due to the pandemic and the boom of remote working. The second most commonly seen attack is vulnerability exploitation with a 31.5% share. The research showed that in only a few incidents, vulnerabilities from 2020 were used. In other cases, adversaries utilized older unpatched vulnerabilities such as CVE-2019-11510, CVE-2018-8453, and CVE-2017-0144.

More than half of all attacks that started with malicious emails, brute force, and external application exploitation were detected in hours (18%) or days (55%), however some of these attacks lasted much longer, with an average duration of up to 90.4 days. This report shows that attacks involving a brute force initial vector are easy to detect in theory, but in practice, only a fraction were identified before causing an impact.

Related Posts
1 of 40,574

Although brute force attack prevention and the control of timely updates do not seem to be problematic for a professional cybersecurity team, in practice, 100% elimination of these issues is virtually impossible:

Recommended AI News: NBA Champion and Successful Entrepreneur Andre Iguodala Added to TriNet PeopleForce Roster of Esteemed Speakers

“Even if the IT security department does its best to ensure safety of the company’s infrastructure, factors such as legacy OS usage, low-end equipment, compatibility issues and human factors often result in security breaches that can jeopardize an organization’s security,” comments Konstantin Sapronov, head of global emergency response team. “Protective measures alone can’t provide holistic cyber defense. Therefore, they should always be combined with detection and response tools that are able to recognize and eliminate an attack at an early stage, as well as address the cause of the incident.”

To minimize the chances of penetration to your infrastructure, Kaspersky recommends the following measures:

  • Implement a robust password policy, including multifactor authentication (MFA) and identity and access management tools;
  • Ensure that patch management or compensation measures for public-facing applications have zero tolerance. Regular updates of vulnerability details from software vendors, scanning the network for vulnerabilities and patch installations are crucial for the security of a company’s infrastructure;
  • Maintain a high level of security awareness among employees. Conducting comprehensive and effective third-party training programs for employees is a good way to save time of IT department and get good results;
  • Implement an Endpoint Detection and Response solution with an MDR service, to detect and react to attacks promptly, among other measures. The use of advanced security services allows businesses to reduce the cost of attacks and prevent undesirable consequences.

Recommended AI News: BenefitMall and Ease Launch One of a Kind Fully Digital, Secure Benefits Selling Experience

Comments are closed.