75% of Enterprises Have Suffered Cyber Attacks, Costing $2M+ On Average 81
coomaria writes "OK, even allowing for the fact this comes from a newly published study (PDF) from a security company, that's still one heck of a statistic. The fact that it's Symantec, and so has access to perhaps more enterprises than most, makes it a double-heck with knobs on. Or how about this one for size: 'every enterprise, yes, 100 percent, experienced cyber losses in 2009.'"
I'm shocked (Score:5, Insightful)
This is like the MPAA/RIAA claiming that "piracy" is costing their respective industries "billions" of dollars. Seriously - if you can't spot the conflict of interest you need to turn in your critical thinking hat.
This is just marketing to increase sales of their "security" products. In fact if you go to the actual PDF linked to in the article it looks suspiciously like a sales brochure, presenting the "problem" and at the end showing how Symantec is the "solution".
Re: (Score:1, Funny)
Re:I'm shocked (Score:5, Insightful)
They claimed it hard enough that analog HD is dead at the end of this year.
Because they scream louder than everyone else they get all the attention.
This screaming about how EVERYONE has suffered losses will be used to force through more draconian laws.... because nobody in the tech field is screaming back.
Re: (Score:3, Insightful)
nobody in the tech field is screaming back
Why would they? As long as it doesn't cost them anything, it's not their fight. (Licensing costs, etc are passed directly on to the consumer)
In fact otherwise working kit being obsoleted is good for the industry, as it helps drive sales of the new kit.
Re: (Score:3, Insightful)
This is just marketing to increase sales of their "security" products.
The reason conflict of interest is a problem is because we don't know whether it is "just" marketing or not.
It's clearly marketing; whether it's true or not is a completely independent matter. Unless you have data which shows something to the contrary, don't dismiss it out of hand, just like you (clearly) don't accept it on their word.
Re:I'm shocked (Score:4, Informative)
Unless you have data which shows something to the contrary, don't dismiss it out of hand, just like you (clearly) don't accept it on their word.
On the contrary, we live in an age where moral decadence is rampant even among professionals. Where well known drug companies create sock puppet "peer reviewed" magazines, with the sole purpose of "publishing" favorable studies for their drugs. Where "climate experts" leave out any inconvenient truth that contradicts the trend they are trying to "prove". Where "expert witnesses" in court turn out to be frauds and lie under oath.
No, today is a time when you must especially dismiss reports like this out of hand. And there are several reasons:
I doubt the CEO of any company would proudly announce how much money his company "lost" due to "cyber-attack" (yes look at us we're vulnerable/we're idiots!). It's none of Symantec's business.
Their categories are meaningless. Please explain the difference between Cyber-attacks, "Traditional criminal activities" and (of course it had to be there) "terrorism"? These are all separate categories according to their survey. Apparently 10% of all companies surveyed have been the victims of "terrorism". This does not correlate well with, say, the evening news.
They claim that on average companies are losing $2 million per year EACH. Yet the majority of companies (71%) are experiencing "no cyber attacks" or "just a few cyber attacks". Clearly these tiny attacks must be devastating.
Another section claims that 29% of respondents claim "significant" or "slight" increase in "attacks" in the past year. What they leave out is that this means 71% of respondents think there is "no increase" or some sort of "decrease". Oops.
Frankly, if you don't know how to think, you get swindled by lies like this. Symantec is out to sell "security" and in order to do that, they are willing to make you think that they are the only ones who can prevent your business from being ruined ($2 million dollars/year/large enterprise, or at least that's how they want it to sound) and that you are surrounded by enemies.
Re: (Score:2)
I consider this news item completely closed after reading your post. What more is there to say?
Thanks.
Re: (Score:1)
No, today is a time when you must especially dismiss reports like this out of hand. And there are several reasons:
I agree with your reasons but I disagree with your premise, and that's actually my point. "Out of hand" means "without looking into the facts of the case," which you clearly have done, based on your comments.
Read it, then punch holes in it, not the other way around. Preferably, punch holes in it in a very public, very verifiable way, so that they look like friggin' idiots and get taken to task by stakeholders, law enforcement, and others in the industry.
Re: (Score:2)
Where people look to tabloids for their "facts".
Re: (Score:2)
The analogy that came to my mind was an insurance salesperson citing , lies ,damned lies and statistics as part of their pitch.
If it sounds too rich to be true, it likely is, further,I wouldn't put it past A.V. and computer security companies to have closet employees actually writing malicious code. Google "mud farming".
Re: (Score:2)
I think you meant to include something about releasing that work into the wild. I doubt the company itself would do it (imagine the liability suits if it took out critical infrastructure), but wouldn't be at all surprised to see some of the individual researchers take their work home to sell.
Re: (Score:2)
if you can't spot the conflict of interest you need to turn in your critical thinking hat.
That would be the Black hat [wikipedia.org] Ironically, those are the perpetrators of the cyber attacks!
Re: (Score:1, Insightful)
so Symantec compiles a report from the business' which use it's product and claim 100% have had a cyber loss, how is this a good thing for symantec? Reading it makes me realize and affirms how useless of a product they make. They will blame it on users but then I would ask what use is their product? Or any other security product currently being marketed out there, if user education is the best prevention, I wonder why we would still need them.
Re: (Score:2)
so Symantec compiles a report from the business' which use it's product and claim 100% have had a cyber loss, how is this a good thing for symantec?
Good one. That is waaaayyy over the head of the marketing people who created er sorry compiled this "report"...
Re: (Score:2)
Their product can be very useful indeed:
http://search.securityfocus.com/swsearch?query=symantec&sbm=bid&submit=Search!&metaname=alldoc&sort=swishlastmodified [securityfocus.com]
To attackers aka hackers ;).
Re: (Score:2)
The problem is real. Windows boxes are inherently insecure and are frequently being exploited. Symantec is one of the many vendors selling mitigation tools. We use Symantec here, both Endpoint Protection and the Exchange scanning component. It's surprising how many viruses make it through Postini/Google but end up getting caught by Symantec when they come through the front-end server.
Everyone knows that anti-virus is last line of defense, and often an only sometimes effective one. Most of the maliciou
Original report... (Score:2)
Re:Original report... (Score:4, Interesting)
Oh, for crying out loud. The report PDF [symantec.com] isn't even searchable: every page is a solid bitmap graphic.
Can anyone tell me what a "brand-related risk" might be for security professionals (see page 6). Do they mean corporate espionage? Or has the CTO threatened to use red-hot irons on the I.T. staff?
Re:Original report... (Score:5, Insightful)
Can anyone tell me what a "brand-related risk" might be for security professionals
Presumably that would be "not buying Symantec security products".
Re:Original report... (Score:4, Informative)
Re: (Score:2)
"Examples might be defacing the website, or stealing customer information. A more subtle attack may be to change the price in a database indicating a sale that doesn't really exist.
I understand your explanation (and it's a good one) but wouldn't your examples fall under the "cyber attacks" category on that same chart?
Re: (Score:2)
What's cheaper? (Score:1, Interesting)
A proper security auditing team or a loss here and there?
Business as usual - avoiding costs because their financial losses are smaller and/or deductable.
Full Text (Score:4, Informative)
'Article' is at best 3 paragraphs, poorly written, with advert popups.
For those who are interested, original text below.
Re:Full Text (Score:5, Insightful)
And you might have heard on the commercial, 1 out of 4 women can't read a pregnancy test, so they made it easier to read. I'm pretty tired of advertising and mock white papers making it out like we're all stupid. Using Symantec security products won't make your business decisions smarter. What it will do is ensure that your minimum spending on security products is done with Symantec. A real white paper on security would have shown all options, and compared them to each other so you can not only make a decision to use security products and why you would do so, but which one suits your needs best.
I think I'm at the point where if the ad, paper, or whatever describes me or other users or the demographic they are after as stupid, I will just shitcan it on principle.
Re:Full Text (Score:4, Interesting)
And of course security is not something you can buy, any more than trust.
With that in mind, here's a stat that Symantec doesn't want you to know:
100% of the companies that depend on Symantec to make them secure are vulnerable.
Re: (Score:2)
I wonder what percentage of these "cyber" losses were the result of an emplo
symantec (Score:3, Insightful)
Just having and paying for symantec is a cyberloss, and that's before a cyber attack!
Re: (Score:2)
Re:symantec (Score:5, Funny)
Seriously, Symantec and McAfee applications are more ill behaved with system resources than most viruses.
Hardly (Score:5, Funny)
I'm here all week, try the veal
"a double-heck with knobs on" (Score:5, Funny)
i'm not familiar with that metric. could you convert that into libraries of congress?
Re: (Score:3, Funny)
Advertising as journalism, on slashdot (Score:4, Informative)
Here's why it's not. (Score:1, Insightful)
You're seeing all of the counter arguments against the sales pitch. So now, when the sales people come in, you can either decimate their argument or decimate their argument with your boss.
Other vendors will still use the BS to sell their horseshit and you will have a ready arsenal of things to consider so you won't fall for their crap.
See? You and your peers get to tackle salesmen BS together.
Think of it as techie How Tos for sales people.
Define "cyber attack". And don't use average (Score:5, Insightful)
Connect any web server to the internet and you'll see tons of connections from botnets trying randomly to exploit various old vulnerabilities. Technically, these are attacks, though you don't need to worry about them if you're patched up.
So is this saying anything more than 75% of enterprises have a web server?
And the average cost is a meaningless number, since averages are swayed by outliers. If you wanted a good statistic for this, you'd use the median. Alternatively, compute the average of (cost of attack / yearly revenue).
Re: (Score:2)
A fair proportion might not have done much even if you were not "patched up", since they never targeted the web server you are running. The actual real risk is that they could operate as a DDOS. Either to the webserver or whatever "security software" you put in front of i
Re: (Score:2)
The mean average is strongly affected by outliers but the median average is not. Generally the median average is the most useful for these kind of figures. I would guess the mean has been used but it seems to be very rare that you are told which average was taken.
Spam (Score:4, Insightful)
Sweet, the first article that was so bad I just tagged it as spam. I'd worry about the future but the filters on the /. editors have been crap for years, surprised there aren't more of these.
I'd be surprised if it's anything less than 100% (Score:5, Informative)
I seriously doubt Symantec are only counting "concerted attacks from a single original with a specific target in mind". More likely they mean "opportunistic attacks".
So, to /., I say:
Those of you who still have your hand up, well done. You've done just about all that is possible to secure your network short of giving everyone dumb terminals and your internal customers are delighted with everything you do.
Everyone else will see an attack from time to time. The whole point of a of security is you have several layers so any attack won't get far.
Re:I'd be surprised if it's anything less than 100 (Score:3, Interesting)
Were it that easy.
Sadly, you can get smashed by the zero-days, the rootkits from hell, the flash-drive-dummies, Mr or Ms I-Don't-Get-Paid-Enough, the supposed 100% spam killing filters, and so on.
Yes, we try. And your concept of filtration via layers works for many types of attacks and security failures. But nothing is foolproof because fools are so ingenioius.
This isn't to justify Symantec's latest PR attempt, just to remind you that while you look organized, something's sneaking up behind you.
Re: (Score:1)
Re: (Score:2)
My point exactly. Welcome to the perfect world.
Re: (Score:2)
Re: (Score:1)
Cyber (Score:1, Funny)
I must verify the claims made in the summary: my workplace suffered severe cyber losses during 2009.
Thankfully, we'd prepared for this, and had ordered in cyber ahead of time so the supply of cyber was not interrupted. (Sadly, we were not as quick to deal with the Y2K bug and, as a result, we incurred almost complete loss of all our cyber.)
Which Enterprises are being counted? (Score:5, Funny)
By my count (of Wikipedia), there are 2 Enterprises from the Continental Navy, 6 from the US Navy, 1 balloon, 1 space shuttle, 1 training ship, and 8 starships that are worth counting, for a total of 19 Enterprises. If 75% have suffered major cyber attacks and we round down, we have 14 cyber-victims.
Here's where it gets weird. Clearly the 8 starships are attackable in the computerized sense. That leaves us with 6 other hackable Enterprises. Most likely 1 is the space shuttle, 1 is the training vessel, and 1 is the contemporary air craft carrier. But that means 3 more Enterprises were cyber-violated out of a pool containing a balloon used during the Civil War and 5 US Navy ships decommissioned between 1823 and 1947.
This seems to be proof of a pre-modern technological underground. Or time travel.
Re: (Score:3, Funny)
The Federation needs more H1B visas so they can outsource security from Qu'onos. Plus, they can pay them less as long as they offer free Bloodwine as a perk.
Sysmantec is bad luck (Score:1)
Actually Only 25% (Score:2, Funny)
This article severely overestimates the impact of cybernetic attacks. According to my count, the borg only invaded 25% of starship enterprises, excluding those existing in alternate timelines/realities.
Internal attacks (Score:2)
We've suffered from several internally launched attacks. Weird stuff too. Raid arrays reporting bad disks, server DOS, server files altered preventing reboot. Under linux too.
Oh wait, that would be me using a cheap raid card, forgetting I'd set the firewall to deny any network access (did it during pre-production testing), and plain vanilla upgrading.
Sorry. Sometimes it's hard to distinguish attacks from f$%#-ups.
Re: (Score:2)
I call BS (Score:2)
Definitions (Score:1)
From page 5:
"Security risks" ranked by importance, by IT Managers:
Cyber Attacks - 42%
Traditional Criminal Activity - 17%
Brand related events - 17%
Natural Distasters - 14%
Terrorism - 10%
So IT Managers are mostly concerned with threats to computers? Colour me surprised.
Confused (Score:1, Interesting)
So, let me see, this is an enterprise (Symantec) responsible for enterprise security saying that enterprise security is crap.......which means that they (Symantec) are not doing too good a job which is something that everyone already knows. Hmmm, nothing to see here, move along.
Strange... (Score:2)
I did not suffer 1 dime because of this, maybe they come to 100% because they only asked their own clients.
It shows 2 things, first they asked very selective (they didn't asked me for instance), and second, it shows how inherently insecure their products are (I am not their client and suffer none problems).
Not that Norton or any other so called security solution can safe people from making bad security decisions, if you make the right decisions then you don't need their products in the first place.
My opinio
Re: (Score:2)
correction:
My opinion is that managers who connect critical infra to internet instead of private networks should at least be jailed for 5-10 years.
should be:
My opinion is that managers who connect critical infra to internet instead of redundant private networks should at least be jailed for 5-10 years.
Not new (Score:2)
Well we have...
NX-01 (I am sure some alian has gotten into their computer)
NCC-1701 (I am sure some alian has gotten into their computer)
NCC-1701-A (Hacked by a Rogue Volcan)
NCC-1701-B
NCC-1701-C
NCC-1701-D (Hacked by the Borg)
NCC-1701-E (Hacked by the Borg)
So I have 71.5% However I haven't read any expanded universe stuff...
Re: (Score:2)
Assuming nominal inflation between now and even the earliest version of the Enterprise's creation, $2 million sounds trivial.
Wessels (Score:2)
I think the more alarming statistic is that 75% of Enterprises have suffered Klingon attacks.
Makes you realize (Score:1)
Makes you see just how much of a problem we do have, when we know that 100% of companies that are attacked, suffer serious losses, you would think the DoD or what not would try to implicate themselves a little more, or which org. would need to be so?
ships named Enterprise (Score:2)
How much is that in Federation Credits?
I should say "see? told you!" (Score:2)
It would certainly be in my best interest, being basically in the same biz as Symantec. But I guess I couldn't keep up a straight face and repeat that. I can see that 75% of enterprises were attacked. That is quite possible. Of course, most of those attacks consisted of little more than a few kids trying to guess passwords (can you see a LOT of "attacks" like that against facebook and the like?). When you strip all the attacks the average router and a sensibly configured server defeat by default, we're prob
I can confirm this! (Score:2)
Really, the cyber attacks on Enterprises are well known. First there was Dr. Daystrom, who "upgraded" an Enterprise with his M-5 computer... Later, another Enterprise was subject ot cyber attack on numerous occasions: the attack by the Iconians was one of the earlier examples. This Enterprise was ultimately destroyed as a result of a cyber attack by Klingons. The next Enterprise was invaded from within by the Borg. So it's actually a pretty common occurrence, it seems.
WTF? (Score:2)
Largest Segment of Cyber Losses? (Score:1)