cloud technologies insufficient of cyber are security ... · pwc, cio and cso, the global state of...

2
of an organization’s IT will be running in the cloud By 2026, 73% FACTS & FIGURES SECURITY CLOUD TECHNOLOGIES SOLUTIONS / TOOLS 55% with external partners collaborate to improve security and reduce risks PwC, CIO and CSO, The Global State of Information Security ® Survey 2017 Web-based attack Phishing / social engineering General malware SQL injection Compromised / stolen devices Denial of services Advanced malware / zero day attacks Cross-site scripting Malicious insider Ransomware 49 % 43 % 35 % 26 % 25 % 21 % 14 % 13 % 11 % 2 % 1% Other 23 % plan to invest in PwC, CIO and CSO, The Global State of Information Security ® Survey 2017 machine learning to increase the level of security and trust. THREAT PREVALENCE IN 2016 WORLDWIDE TROJANS BROWSER MODIFIERS SOFTWARE BUNDLERS 1 2 3 3,9 % 11,3 % 4,1% “WHAT TYPES OF ATTACKS DID YOUR BUSINESS EXPERIENCE?” 43 % OF CYBER ATTACKS... Current technologies cannot detect and block many cyber attacks. Most exploits have evaded intrusion detec- tion systems and anti-virus solutions. of company data will be stored in the cloud By 2020, 89 % PERSONNEL, BUDGET AND TECHNOLOGIES... ...INSUFFICIENT TO HAVE A STRONG SECURITY POSTURE. ARE ...TARGET SMALL BUSINESS 29% 22% 12% EFFECT OF CLOUD APPLICATIONS ON ORGANIZATION’S SECURITY POSTURE I m p r o v e s s e c u r i t y p o s t u r e C a n n o t d e t e r m i n e N o a e c t o n s e c u r i t y p o s t u r e D i m in ish e s s e c u r it y p os t u r e 38% 48 % are delivered via cloud of IT services PwC, CIO and CSO, The Global State of Information Security ® Survey 2017 The cloud introduces a num- ber of new attack vectors that were previously unavailable to intruders in the on-premises world. These new attack types require that we evolve our methods of attack detection. Microsoft Security Intelligence Report Vol. 21 Monitored or managed firewalls or intrusion prevention systems (IPSs) Managed or monitored security gateways for messaging or Web traffic Monitored or managed intrusion detection systems (IDSs) Managed vulnerability scanning of networks, servers, databases or applications Monitored or managed multifunction firewalls 23 % 40 % 47 % 50 % 74 % 86 % CLIENT FIREWALLS 90 % ANTI-MALWARE 71 % PASSWORD PROTECTION/ MANAGEMENT SECURITY TECHNOLOGIES CONSIDERED ESSENTIAL AND VERY IMPORTANT: SERVICES PROVIDED BY MSSPS TO SUPPORT AN ORGANIZATION’S IT SECURITY POSTURE ARTIFICIAL INTELLIGENCE 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB), Sponsored by Keeper Security, Ponemon Institute © Research Report 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB), Sponsored by Keeper Security, Ponemon Institute © Research Report 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB), Sponsored by Keeper Security, Ponemon Institute © Research Report https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB), Sponsored by Keeper Security, Ponemon Institute © Research Report https://www.statista.com/statistics/638593/worldwide-data-center- storage-capacity-cloud-vs-traditional/ https://softwarestrategiesblog.com/ 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB),Sponsored by Keeper Security, Ponemon Institute © Research Report Microsoft Security Intelligence Report Vol. 21 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB), Sponsored by Keeper Security, Ponemon Institute © Research Report business get a failing grade for disaster recovery. 3 out of 4 TOP 5 https://www.infrascale.com/25-disaster-recovery-statistics-for-2015-infographic/

Upload: others

Post on 30-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CLOUD TECHNOLOGIES INSUFFICIENT OF CYBER ARE SECURITY ... · PwC, CIO and CSO, The Global State of Information Security® Survey 2017 The cloud introduces a num-ber of new attack

of an organization’s IT will be running in the cloud

By 2026,

73 %

FACTS & FIGURESSECURITY

CLOUD TECHNOLOGIES

SOLUTIONS / TOOLS

55%with external partnerscollaborate

to improve security and reduce risksPwC, CIO and CSO, The Global State of Information Security® Survey 2017

Web-based attack

Phishing / social engineering

General malware

SQL injection

Compromised / stolen devices

Denial of services

Advanced malware / zero day attacks

Cross-site scripting

Malicious insider

Ransomware

49 %

43 %

35 %

26 %

25 %

21 %

14 %

13 %

11 %

2 %

1% Other

23 %plan to invest in

PwC, CIO and CSO, The Global State of Information Security® Survey 2017

machine learning to increasethe level of security and trust.

THREAT PREVALENCE IN 2016 WORLDWIDE

TROJANSBROWSER MODIFIERSSOFTWARE

BUNDLERS

1 233,9 % 11,3 % 4,1%“WHAT TYPES OF ATTACKS

DID YOUR BUSINESS EXPERIENCE?”

43 % OF CYBER ATTACKS...

Current technologies cannot detect and block many cyber attacks. Most exploits have evaded intrusion detec-tion systems and anti-virus solutions.

of company datawill be stored in the cloud

By 2020,

89 %

PERSONNEL, BUDGET AND TECHNOLOGIES...

...INSUFFICIENT TO HAVE A STRONG SECURITY POSTURE.AR

E

...TARGET SMALL BUSINESS

29%

22%

12%

EFFECT OF CLOUD APPLICATIONS ON ORGANIZATION’SSECURITY POSTURE

Improves security posture

Cannot

determine

No a� ect on security posture Diminishes secur

ity po

sture

38%

48 %are delivered via cloudof IT services

PwC, CIO and CSO, The Global State of InformationSecurity® Survey 2017

The cloud introduces a num-ber of new attack vectors

that were previously unavailable to intruders in the on-premises world. These new attack types require that we evolve our methods of attack detection. Microsoft Security Intelligence Report Vol. 21

Monitored or managed fi rewalls or intrusion prevention systems (IPSs)

Managed or monitored security gateways for messaging or Web tra� c

Monitored or managed intrusion detection systems (IDSs)

Managed vulnerability scanning of networks, servers, databases or applications

Monitored or managed multifunction fi rewalls23 %

40 %

47 %

50 %

74 %

86 %CLIENT

FIREWALLS

90 %ANTI-MALWARE

71 %PASSWORD

PROTECTION/ MANAGEMENT

SECURITY TECHNOLOGIES CONSIDERED ESSENTIAL AND VERY IMPORTANT:

SERVICES PROVIDED BY MSSPS TO SUPPORT AN ORGANIZATION’S IT SECURITY POSTURE

ARTIFICIAL INTELLIGENCE

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB), Sponsored by Keeper Security, Ponemon Institute© Research Report2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB), Sponsored by Keeper Security, Ponemon Institute© Research Report

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB),Sponsored by Keeper Security, Ponemon Institute© Research Report

https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB),Sponsored by Keeper Security, Ponemon Institute© Research Report

https://www.statista.com/statistics/638593/worldwide-data-center-storage-capacity-cloud-vs-traditional/

https://softwarestrategiesblog.com/

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB),Sponsored by Keeper Security,

Ponemon Institute© Research Report

Microsoft Security Intelligence Report Vol. 21

2016

Sta

te o

f Cyb

erse

curit

y in

Sm

all &

Med

ium

-Size

d Bu

sines

ses

(SM

B), S

pons

ored

by

Keep

er S

ecur

ity, P

onem

on In

stitu

te© R

esea

rch

Repo

rt

business get a failing grade for disaster recovery.3 out of 4

TOP 5 https://www.infrascale.com/25-disaster-recovery-statistics-for-2015-infographic/

Page 2: CLOUD TECHNOLOGIES INSUFFICIENT OF CYBER ARE SECURITY ... · PwC, CIO and CSO, The Global State of Information Security® Survey 2017 The cloud introduces a num-ber of new attack