Major Highlights of Cisco 2017 Annual Cybersecurity Report

Global technology and security company, Cisco has unveiled it’s 2017 Annual Cybersecurity Report, a report which identifies the latest threat intelligence, as well as providing security trends.

The report highlights key findings from the third annual Cisco Security Capabilities Benchmark Study (SCBS), it examines security professionals perceptions of the state security in their organisations.

Unveiling the report, Olakunle Oloruntimehin, Country Manager, Cisco Nigeria said cybercrime is more of an ecosystem, that is well cordianted and robust in nature.

He said the report resonates with the current situation in the cyberworld, however urged various organisations to keep close tabs with the strategies of cybercriminals and be proactive by deploying the necessary tools to combating attacks.

Here are the major highlights of the report, according to cisco.

The Expanding Attack Surface

Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years.

By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic. Average broadband speeds are on pace to nearly double between 2015 and 2020.

This explosive growth in speed, digital traffic, and mobile endpoints creates a broader attack surface with more choices of targets and approaches.

Cloud-based services are quickly dissipating the security perimeter. Add tight budgets, a scarcity of skilled defenders, and cybercriminals operating more like their targeted businesses, and the challenges security teams face.

The Evolving Threat

Today’s adversaries continue to find new ways to operate, experimenting with a wide range of malware delivery methods. Their varied techniques for gaining access to organizational resources exploit lapses in patching and updating, lure users into socially engineered traps, and inject malware into supposedly legitimate online content.

Our adversaries move with speed and agility to evade detection and continually evolve their strategies. Once their tactics are no longer productive, have outlived their usefulness or been compromised, the operator quickly and quietly shifts tactics or shuts down the operation and moves on.

Evolving Time to Operate

To this end, we introduced a new metric this year – Time to Evolve – the time it takes adversaries to change how they deliver specific malware and the length of time between each tactical change. The report describes how adept cybercriminals are in shifting attack vectors and their techniques to evade detection. It also shares how we must evolve our defenses to keep pace.

We continue to measure Time to Detection (TTD) as an indicator of how quickly an organization can detect a threat. Cisco’s median TTD trended down from 39 hours in November 2015 to 6 hours in October 2016, with an average median TTD of about 9 hours from May through October 2016. That is certainly an exciting trend, and one we will continually refine our approach to tighten further.

Obstacles to Advancing Security

So what’s holding security professionals back? Top constraints cited are budget (35%), compatibility (28%), certification (25%), and talent (25%). Lack of budget is a perennial challenge for security teams, as is disparate systems that don’t integrate – where security is “bolted on” rather than embedded. These non-integrated defense systems can allow for gaps of time and space where cybercriminals can launch attacks.

Security professionals stretch budgets by adopting outsourced expertise, and relying on cloud solutions and automation to make the most of limited personnel. A well-resourced and expert IT security team, paired with the right tools, policies and processes, can work together to achieve better security outcomes. Think simple, integrated, and automated.

Making the Most of a Bad Situation

Half of the organizations surveyed suffered a security breach that involved public scrutiny. Of those, half disclosed the breach voluntarily, while one-third were disclosed by someone else. The days of quietly dealing with breaches may be long gone with so many regulators, media, and social media users there to expose the news.

What’s promising for organizations that have experienced a public breach is that they’re taking it as a learning opportunity. Organizations once reluctant to admit when they’ve been breached are sharing more quickly and openly with law enforcement, regulators, investors, and customers. The more organizations share when an attack has occurred, the better position we’ll all be in to help each other and defend ourselves.

Defending Our Turf

So what are we to do? Every organization needs to make cybersecurity a business-level priority. Leadership must own and evangelize cybersecurity, instilling and driving its importance and the proper defense techniques throughout the organization. Cybersecurity can’t be “an IT challenge;” its effects are too broad and costly.

We can no longer just throw more money, people or technology at the problem. In this complex landscape of fast and frequent evolution, it’s not enough to rely on human expertise and point solutions. We need a simple, integrated security architecture that provides near-real-time insight into threats, with automated detection and automatic defense. The Time to Evolve metrics in this report bear this out.

Download Report Here