• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
better patch management and password policies cut cyber attacks by

Better patch management and password policies cut cyber attacks by 60%

You are here: Home / General Cyber Security News / Better patch management and password policies cut cyber attacks by 60%
September 13, 2021

Shutterstock

Deploying an proper patch management plan decreases the risk of hacking by 30%, although a robust password coverage cuts down the chance of getting attacked by 60%, according to a new report.

The Incident Response Analyst Report 2021, printed by IT security organization Kaspersky, observed brute force is the most broadly utilized preliminary vector to penetrate a company’s network. Compared to the former year, the share of brute power attacks has skyrocketed from 13% to 31.6%. The report’s authors mentioned this was maybe owing to the pandemic and the increase of remote performing.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The assessment of anonymized facts from incident reaction (IR) cases discovered that the next most observed attack is vulnerability exploitation with a 31.5% share. The analysis showed that vulnerabilities from 2020 ended up utilized in only a few incidents. In other conditions, adversaries employed more mature, unpatched vulnerabilities, these kinds of as CVE-2019-11510, CVE-2018-8453, and CVE-2017-0144.

Around fifty percent of attacks that begun with destructive email messages, brute pressure, and external application exploitation were detected in hours (18%) or times (55%). The report extra that  some of these attacks lasted substantially more time, with an normal length of up to 90.4 days. 

The report also discovered that industrial businesses had been the most influenced by cyber attacks (22%), followed by governing administration establishments (19%). 

Evaluation of the details from incident responses observed that in 44% of all incidents, hackers used present, effectively recognised offensive tools from GitHub, these as Mimikatz, AdFind, and Masscan. They also employed specialised industrial frameworks, this kind of as Cobalt Strike.

Konstantin Sapronov, head of Kaspersky’s global unexpected emergency response workforce said that even if the IT security department does its greatest to make certain safety of the company’s infrastructure, legacy OS usage, low-conclude devices, compatibility issues, and human variables normally end result in security breaches that can jeopardize an organization’s security.

“Protective actions on your own just can’t deliver a holistic cyber protection. As a result, they ought to generally be mixed with detection and reaction equipment that are able to acknowledge and reduce an attack at an early phase, as nicely as tackle the induce of the incident,” Sapronov explained.

The report urged organizations to deploy a sturdy password coverage, like multi-factor authentication (MFA) and id and accessibility administration applications, and ensure software program is patched routinely to take care of vulnerabilities.


Some components of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «are qr codes safe? Are QR codes safe?
Next Post: Critical Bug Reported in NPM Package With Millions of Downloads Weekly critical bug reported in npm package with millions of downloads»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.