• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Practically 50 % of Organizations Strike By COVID-Associated “Business Impacting Cyber-Attack” in 2020

You are here: Home / General Cyber Security News / Practically 50 % of Organizations Strike By COVID-Associated “Business Impacting Cyber-Attack” in 2020
August 5, 2020

Just under 50 percent of firms have skilled at least one “business impacting cyber-attack” linked to COVID-19 as of April 2020.

In accordance to study of 416 security and 425 business enterprise executives by Forrester Consulting and Tenable, 41% of respondents documented the statistic linked to COVID-19, although 94% of executives say their firms have skilled a business enterprise-impacting cyber-assault or compromise inside the past 12 months. “That is, 1 ensuing in a loss of shopper, employee or other confidential details interruption of day-to-day functions ransomware payout financial decline or theft and/or theft of mental home,” the research reported.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Also, 78% of respondents said they anticipate an improve in cyber-assaults over the subsequent two yrs though 47% noted encountering five or much more attacks. In an email to Infosecurity, Bryan Becker, item manager at WhiteHat Security, mentioned: “There is no cause to assume this development to ever reverse, so we are only very likely to see additional and much more assaults in the foreseeable future.

“Businesses can and must be investing in software security groups, as well as regular training for all members of the organization. CEOs and govt groups unquestionably should really be viewing at least quarterly briefs from the security crew to realize the consequence of their financial investment, as very well as the present point out of affairs.”

On the influence of the COVID-19-associated attacks, Tom Pendergast, main learning officer at MediaPro, reported even though COVID-19 may well have changed the subject matter and scale of attacks, “the concentrate on of most of all those assaults hasn’t transformed.

“They’re likely immediately after workforce, who in this time of stress and uncertainty are more susceptible than at any time,” he said. “Preparing your workers to protect on their own and the company indicates teaching them to be highly skeptical and resistant to makes an attempt to get hold of data and entry. Get, for illustration, the latest Twitter hack, perpetrated by a criminal who realized enough about an worker to break down their defenses.”

Rod Holmes, director and vCISO at the Crypsis Group, claimed menace actors normally search to capitalize on emotion, catastrophe and chaos, and individuals, company IT systems and ICS methods (OT programs) have all been targeted. In particular, the investigation observed that 65% of attacks associated operational technology property, and 63% of security leaders confess it’s probably their methods endured an mysterious compromise more than the past calendar year.

Holmes explained: “Organizations that have that unique privilege of defending our nation’s critical infrastructure have an specifically vital part to participate in in security as nation states look for prospects to infiltrate critical programs. Nation condition actors are very opportunistic, persistent and individual — they will glance for opportunities to strike when companies are useful resource-strained and targeted on keeping operations in the course of occasions of improve or problem.

“COVID has offered country states the prospect to fly beneath the radar and capitalize on chaotic environments in which IT personnel are eaten with increasing remote access potential — even industrial businesses have experienced major office staff doing work remotely in the course of the disaster. This is in particular an issue with companies that have ICS infrastructure intermingled with IT infrastructure and that do not have just about every environment separated as suggested by NIST benchmarks.”

Previous Post: «Trade Minister Hack Led To Trade Secrets Leak Before U.k. Trade minister hack led to trade secrets leak before U.K. election
Next Post: Microsoft Groups Patch Bypass Will allow RCE Microsoft Groups Patch Bypass Will Allow Rce»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.