Upload
cisco-italia
View
357
Download
1
Embed Size (px)
Citation preview
Ine�ective Defenses
55% of SecOps quarantine orremove malicious applicationsas a method
of CISOs report using patching and con�guration as a defense, while the others leave holes for the attackersto exploit
40%
of all OpenSSL versions are olderthan 50 months,potentially exposing crypto keys and passwords
56%
of SecOps report �rewall logs are the most common tool to analyze compromised systems, o�ering limited data and no context
For example, only
No leading method to eliminate causes of security incidentswere identi�ed:
Download the 2015 Annual Security Report
Before an Attack
During an Attack
59% After an Attack
Only
of SecOps report leveragingIdentity Administration andProvisioning, which means over 50% of organizations lackcontext to user identity and activity
43%Only
Defenders
Malicious add-ons unwittingly loaded from untrustworthy sources
The likelihood thatusers in highly targetedindustries succumb toClickfraud and Adware
Users Complicit Enablers
Unpatched browsers are a dominating concernPercentage of users runninglatest versions:
64%GoogleChrome
10%MicrosoftInternet Explorer
2X
Exploit kit activity fell
exploitsdropped 34%
88%
Preferred attack vectors:
AttackersShifting Attack Methods
more prevalent than other types of malware
Add-ons spikein October
250%Malvertising
Downloader
6XSPAM250%Malicious spamactivity back onthe rise
Java
MicrosoftInternet Explorer
MicrosoftSilverlight
AdobeFlash
©2015 Cisco and or its a�liates. Other company, product and service names may be trademarks or service marks of others.
Once inside, attackers createa persistent, uncheckedstate of infection in stealth.
Adversaries are committed to continually re�ning or developing new techniques that evade detection and hide malicious activity. Security teams must adapt their approach to protecting the organization and users from increasingly sophisticated campaigns.
Based on 2014 data
www.cisco.com/go/asr2015
Attackers ExploitDefensive Gaps