{"id":2728,"date":"2014-10-17T15:25:25","date_gmt":"2014-10-17T15:25:25","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2728"},"modified":"2019-11-15T23:05:50","modified_gmt":"2019-11-15T12:05:50","slug":"a-hole-in-the-fence-is-there-a-partial-preparedness-to-cyberthreats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/a-hole-in-the-fence-is-there-a-partial-preparedness-to-cyberthreats\/2728\/","title":{"rendered":"A hole in the fence: is there a &#8220;partial preparedness&#8221; to cyberthreats?"},"content":{"rendered":"<p>Can a business be \u201cpartially\u201d prepared to ward off cyberthreats? It\u2019s definitely a subject of debate. Here\u2019s our take:<\/p>\n<p>There is an entertainment media staple: a powerful, very high wall or fence with heavily guarded gates, but with a small hole somewhere away from patrols, watchtowers and spotlights, wide enough for a single person to slip through. We see this in films, video games, comic and books. It\u2019s not always done for comic relief: How else would the hero get into the lair of an evil mastermind plotting to take over the world? Through the hole in the fence, of course.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>Funny or not, but it\u2019s a textbook theorem that every system is as strong as its weakest point.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>A hole in the fence: is there a \u201cpartial preparedness\u201d to cyberthreats? #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FGDj4&amp;text=A+hole+in+the+fence%3A+is+there+a+%26%238220%3Bpartial+preparedness%26%238221%3B+to+cyberthreats%3F+%23protectmybiz+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>We had a debate with a couple of friends recently: Is there such a thing as \u201cpartial readiness\u201d in cybersecurity? A student can try to pass an exam knowing two-thirds of the academic course and being clueless about the remaining part. It is even possible that an employer would hire a young IT worker, despite large gaps in their knowledge; say, he or she is great at networks, but has little experience in virtualization.<\/p>\n<p>But partial security is like a unicorn: There\u2019s no such thing. A business may implement an antivirus at every box within its infrastructure, but \u201csuddenly\u201d there is a phishing attack or a fraudulent payment, and things get ugly.<\/p>\n<p>That\u2019s just a theory, but here is the reality: Between April 2013 and May 2014 94% of companies polled for Kaspersky Lab\u2019s <a href=\"http:\/\/ow.ly\/CF7XL\" target=\"_blank\" rel=\"noopener nofollow\">Global IT Risk Report<\/a> have experienced some form of external security threat. However, only 68% have fully implemented anti-malware solutions on their workstations and only 44% employ security solutions for their mobile devices. Only <strong>52%<\/strong> of all businesses surveyed regularly patch or update software \u2013 an important task in preventing malware attacks or data breaches.<\/p>\n<p>Well, isn\u2019t that nice? After experiencing a threat, only one-third of more than half of the companies affected did little to protect themselves further. They \u201cpartially\u201d upgraded their defenses \u2013 plugged a couple of holes leaving a few more wide open.<\/p>\n<p>There\u2019s a lot of misconception and misperception regarding the current threat landscape. The survey above shows 91% of business decision makers underestimate the number of threat samples discovered daily. Just 4% have an accurate idea of the actual number. More to the point, most of us dramatically underestimate this figure, with 70% believing there are less than 10,000 new samples discovered daily. The actual figure, as detected by Kaspersky Lab, is 315,000 new samples. Three hundred and fifteen thousand new malicious programs are intercepted on a daily basis.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2017\/05\/06020341\/wide1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2730\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2017\/05\/06020341\/wide1.png\" alt=\"wide\" width=\"1000\" height=\"707\"><\/a><\/p>\n<p>Despite underestimating the number of threats, participants in the survey reported a perceived increase in the number of cyber-attacks every year for the last 4 years. This might suggest businesses feel what hits them and the number of attacks keeps growing, but they don\u2019t think (or don\u2019t know or care) about the actual scope. The less you know, the better you sleep. But doesn\u2019t this attitude seem a bit inappropriate for businesses?<\/p>\n<p>Businesses of all sizes have reported rising levels of spam, phishing and DDOS attacks as areas of concern. Corporate espionage and specific, targeted attacks are also on the rise. The number of organizations reporting specific attacks targeting them directly has increased by 5% from 2013, and now stands at 15%.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Is there such a thing as \u201cpartially secure\u201d IT? #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FGDj4&amp;text=Is+there+such+a+thing+as+%26%238220%3Bpartially+secure%26%238221%3B+IT%3F+%23protectmybiz+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It doesn\u2019t look like businesses really understand malware is indeed one of the root causes of phishing attacks, DDoS, etc. While there are a number of security measures already being taken, there are still large gaps in IT security systems, regardless of business size. That means the many businesses are only \u201cpartially\u201d protected. Essentially, they are \u201cwoefully underprepared\u201d for the threats they face \u2013 there\u2019s just no real difference between \u201cpartially prepared\u201d and \u201ccompletely unprepared.\u201d<\/p>\n<p>Details of the recent survey are available <a href=\"http:\/\/ow.ly\/CF7XL\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can a business be &#8220;partially&#8221; prepared to ward off cyberthreats? That\u2019s up for debate, but it seems there is little difference between &#8220;partial protection&#8221; and no protection at all.<\/p>\n","protected":false},"author":209,"featured_media":15786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[282,491,2203],"class_list":{"0":"post-2728","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-cyberthreats","11":"tag-partial-preparedness"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-hole-in-the-fence-is-there-a-partial-preparedness-to-cyberthreats\/2728\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-hole-in-the-fence-is-there-a-partial-preparedness-to-cyberthreats\/2728\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-hole-in-the-fence-is-there-a-partial-preparedness-to-cyberthreats\/2728\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=2728"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2728\/revisions"}],"predecessor-version":[{"id":24954,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2728\/revisions\/24954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15786"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=2728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=2728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=2728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}