Philip Cao

Stay Hungry. Stay Foolish.

Technology Controls Against APTs ‘Not Working’: Study

3 min read

As IT security practitioners struggle to defend against APTs (Advanced Persistent Threats), a new study by the Ponemon Institute finds malware installed via zero-day exploits presents the biggest threat to corporate data.

After surveying 755 IT security professionals who are involved in protecting organizations from targeted attacks, the Ponemon Institute found that current technology controls against APTs “are not working” and warned that the average cost to restore a company’s reputation following an APT attack is in the range of $9.4 million.

Not surprisingly, the Institute found that malware is almost always used as the source of an APT attack.  More than half of the respondents (68%) say zero-day attacks that look to bypass firewalls, intrusion detection systems, and anti-malware programs are the greatest threats to an organization.

The security pros say third-party software from Oracle (Java) and Adobe (Reader) pose the most risk because these are the most difficult applications to ensure that all security patches have been fully implemented in a timely fashion.

According to the study, the security practitioners also complained about difficulties in managing security patches from Microsoft (Windows) and Adobe (Reader and Flash).

Despite these risks, 75% of those surveyed acknowledged that their company continued to use Java and Reader in the production environment knowing that vulnerabilities exist and a viable security patch is unavailable.

The security professionals explained that the company could not afford the cost of downtime waiting for the patch to be implemented; or they simply did not have the professional staff available to implement a security patch.

In the case of Oracle Java, the survey found that Java vulnerabilities are very difficult to fix (patch) or resolve. Sixty-one percent of respondents say that a realistic timeframe for patching Java in their organization is once per month or quarter. Despite the risk posed by Java, 55% of respondents say it is nearly impossible to replace it with a less risky alternative.

Although the main approaches to detecting APTs are intrusion detection systems (IDS), anti-malware software and intrusion prevention systems (IPS), more than half of the respondents say they discovered an APT by accident.

On average, it took about 225 days to detect APTs launched against an organization, according to the study.

Ryan is the host of the podcast series “Security Conversations – a podcast with Ryan Naraine“. He is the head of Kaspersky Lab’s Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats. Prior to joining Kaspersky Lab, he monitored security and hacker attack trends for over 10 years, writing for eWEEK magazine and the ZDNet Zero Day blog. Follow Ryan on Twitter @ryanaraine.

[Source: SecurityWeek]


Leave a Reply

Copyright © 2006-2022 Philip Hung Cao. All rights reserved