{"id":15048,"date":"2019-04-09T08:00:05","date_gmt":"2019-04-09T16:00:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8797\/"},"modified":"2019-04-09T08:00:05","modified_gmt":"2019-04-09T16:00:05","slug":"news-8797","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8797\/","title":{"rendered":"How Likely Is Your Organization to Be Breached?"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 09 Apr 2019 14:00:40 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Trend Micro and the Ponemon Institute teamed up to produce a new <a href=\"https:\/\/www.trendmicro.com\/en_us\/security-intelligence\/breaking-news\/cyber-risk-index.html\">Cyber Risk Index<\/a> (CRI), which will be updated every six months. Today I want to dive a bit deeper into the results found in the inaugural survey that went out to more than 1,000 IT professionals and executives within organizations based in the USA. I also want to identify some differences between the responses given by the different sized organizations, broken out by small, medium, and enterprise.<\/p>\n<p><strong>The CRI<\/strong><\/p>\n<p>Before we go into these details, I want to simply explain how the CRI was calculated. The CRI is made up of two components, the Cyber Preparedness Index (how prepared are you to combat threats) and the Cyber Threat Index (your experience dealing with threats). The formula is as follows:<\/p>\n<p><strong>CRI = CPI \u2013 CTI<\/strong><\/p>\n<p>The CRI is on a -10 to +10 scale with -10 being the highest risk. Below are the results based on organization size.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-542818\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-1024x147.jpg\" alt=\"\" width=\"1024\" height=\"147\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-1024x147.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-300x43.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-768x110.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-640x92.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-900x129.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-440x63.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI-380x55.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/CRI.jpg 1227w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The results seem to line up with what most would expect \u2013 small businesses have the highest cyber risk, medium businesses with less cyber risk and enterprises having the least cyber risk based on the factors that make up the index. Let\u2019s now look at some of the more detailed results from the survey.<\/p>\n<p><strong>Key Survey Results<\/strong><\/p>\n<p>The top risk reported for cyber preparedness was interesting, as small business and enterprise respondents face the same primary concern:<\/p>\n<p>Small business &amp; Enterprise: My organization\u2019s IT security function has the ability to know the physical location of business-critical data assets and applications.<\/p>\n<p>Medium business: My organization\u2019s enabling security technologies are sufficient to protect data assets and IT infrastructure.<\/p>\n<p>To some extent, this primary risk may not be surprising. In a small business, there isn\u2019t usually a lot of IT function and in an enterprise, the network tends to be very big and broad so knowing where these assets are physically located can be a difficult task. On the other hand, the medium-sized businesses may not have sufficient budget to allow them to afford some of the key components that make up a very secure environment.<\/p>\n<p>On the other end of the CRI \u2013 the Cyber Threat Index \u2013 we reaffirm that threats are universal. Businesses of all sizes are dealing with cyber threats every day. Here are some of the most interesting takeaways from the survey:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Small business respondents stated:\n<ul>\n<li>26% had 3-6 separate cyberattacks that infiltrated their organization in the past 12 months, while 11% have had 7-10 and 6% reported more than 10 such instances in the past year.<\/li>\n<li>34% said it\u2019s <u>very likely<\/u> they will experience a cyber-attack that will infiltrate their organizations in the next 12 months.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Medium business respondents stated:\n<ul>\n<li>19% had 3-6 separate cyberattacks that infiltrated their organization in the past 12 months. 14% reported 7-10 such incidents, and 8% have faced more than 10<\/li>\n<li>35% said it\u2019s <u>very likely<\/u> they will experience a cyber-attack that will infiltrate their organizations in the next 12 months.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Enterprise respondents stated:\n<ul>\n<li>19% had 3-6 separate cyberattacks that infiltrated their organization in the past 12 months. Another 15% have had 7-10, but only 3% said they\u2019ve had more than 10.<\/li>\n<li>39% said it\u2019s <u>likely<\/u> they will experience a cyber-attack that will infiltrate their organizations in the next 12 months \u2013 only 29% said very likely<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As you see above, it is almost inevitable that an attack will occur in the next 12 months and that it will be successful. These responses show why all organizations have a high cyber threat environment today.<\/p>\n<p>The intent of the CRI is to give organizations an understanding of their risk levels and insights into many areas of their security posture. From the results, they can make changes to their security infrastructure, policies, and educating their employees and board members to help minimize their risk in the future. As we continue to run the CRI survey every six months, we hope to see gradual improvement in the results.<\/p>\n<p>Stay tuned for more insights from the survey in future blogs. If you want to check out the current results and take a mini version of the survey, go to our landing page <a href=\"https:\/\/www.trendmicro.com\/en_us\/security-intelligence\/breaking-news\/cyber-risk-index.html\">here<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/how-likely-is-your-organization-to-be-breached\/\">How Likely Is Your Organization to Be Breached?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/how-likely-is-your-organization-to-be-breached\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 09 Apr 2019 14:00:40 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/04\/20190131180422269-645-1SCUZO6-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Trend Micro and the Ponemon Institute teamed up to produce a new Cyber Risk Index (CRI), which will be updated every six months. Today I want to dive a bit deeper into the results found in the inaugural survey that went out to more than 1,000 IT professionals and executives within organizations based in the&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/how-likely-is-your-organization-to-be-breached\/\">How Likely Is Your Organization to Be Breached?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[20895,20893,714],"class_list":["post-15048","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cyber-risk-index","tag-cyber-risk-index-cri","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15048"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15048\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15048"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}