{"id":6964,"date":"2017-03-14T05:00:11","date_gmt":"2017-03-14T13:00:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/14\/news-755\/"},"modified":"2017-03-14T05:00:11","modified_gmt":"2017-03-14T13:00:11","slug":"news-755","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/14\/news-755\/","title":{"rendered":"Challenges and Opportunities for 2017: Trend Micro Global Research Peels Back the Layers"},"content":{"rendered":"<p><strong>Credit to Author: Raimund Genes (Chief Technology Officer)| Date: Tue, 14 Mar 2017 12:00:08 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The year 2017 could be a pivotal moment for cybersecurity in Europe. And that\u2019s thanks to two things: alleged state-sponsored interference in forthcoming national elections in the region, and looming European data protection laws. Both have escalated the issue of online threats and data security right up to board level, in Europe and the U.S. But what happens once it\u2019s there? When it comes to all things cyber, knowledge is power.<\/p>\n<p>So Trend Micro decided to find out what\u2019s happening on the IT frontline, by polling more than 2,400 decision makers.\u00a0The resulting country-level reports offer a vital snapshot into the extent of the cyber threat facing organizations across the U.S. and Europe, where IT leaders believe they are most exposed, and how they are using advanced security to fight back.<\/p>\n<p><strong>Attack after attack<\/strong><\/p>\n<p>Nearly two-thirds of IT leaders we polled said they\u2019d suffered a known major attack over the past 12 months \u2013 proof if any were needed of the extent of the threat facing organizations from cyberspace. In fact, they were attacked on average four times \u2013 although the figure varied significantly, between the Nordics at the low end and Italy, where firms suffered eight on average.<\/p>\n<p>Of those four attacks, three were ransomware \u2013 still plaguing U.S. and European organizations despite the best efforts of the white hats to educate businesses on threat protection. Phishing (31%), business email compromise (17%) and cyber espionage (15%) were the next biggest threats last year.<\/p>\n<p>But more importantly, where do IT leaders believe the main threats will come from in 2017? Cyber espionage (20%), topped the list. Could this be a reaction to the wall-to-wall media coverage of alleged state-sponsored interference in the U.S. and upcoming European elections? It\u2019s certainly a growing threat, both in terms of nation state spying and financially motivated cybercrime. Targeted attacks and phishing came next \u2013 linked both to each other and to cyber espionage, which is mostly targeted in nature. It seems that organizations are still struggling to get to grips with covert attacks designed to slip under the radar of traditional defenses.<\/p>\n<p>All the experts agree that if a hacker is determined enough they will be able to scale any perimeter wall to get inside your network. The key therefore is to build resilience into your security so you\u2019re able to spot when they do get in as soon as possible, minimizing the potential fall out.<\/p>\n<p>That requires layer upon layer of defense \u2013 optimized so the right layer will mitigate the right threat at the right time.<\/p>\n<p><strong>Securing the future<\/strong><\/p>\n<p>The good news is that two-thirds of European and U.S. IT bosses are using advanced tools like behavioral analytics and machine learning \u2013 although the figure drops down to 29% in Sweden and up to 78% in the U.S. But importantly, they\u2019re not using them for the sake of it \u2013 three-quarters think these tools and techniques are effective in stopping cyber attacks and more than half actually believe they will make the job of IT professionals easier going forward.<\/p>\n<p>So, what of the future? There was a huge disparity between those IT leaders most confident they understand the challenges facing their organization (France, 92%) and those who were not (Sweden, 56%). But that could be a reflection of many things \u2013 not least how much visibility into systems, and therefore insight into the scale of the challenge, they have.<\/p>\n<p>What most respondents did agree on, however, was that the most value to their organization will come from seeking out a vendor able to integrate multiple layers of security \u2013 including advanced tools \u2013 in a single platform. As European and U.S. organizations brace for the General Data Protection Regulation in May 2018, it\u2019s reassuring that so many are heading in the right direction.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/challenges-opportunities-2017-trend-micro-global-research-peels-back-layers\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Raimund Genes (Chief Technology Officer)| Date: Tue, 14 Mar 2017 12:00:08 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/GettyImages-489668178-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The year 2017 could be a pivotal moment for cybersecurity in Europe. And that\u2019s thanks to two things: alleged state-sponsored interference in forthcoming national elections in the region, and looming European data protection laws. Both have escalated the issue of online threats and data security right up to board level, in Europe and the U.S&#8230;.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714],"class_list":["post-6964","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6964"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6964\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6964"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}