{"id":16234,"date":"2021-07-13T03:40:00","date_gmt":"2021-07-13T03:40:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/07\/13\/84-of-organizations-experienced-phishing-ransomware-type-threats-in-the-past-12-months\/"},"modified":"2021-07-13T03:40:00","modified_gmt":"2021-07-13T03:40:00","slug":"84-of-organizations-experienced-phishing-ransomware-type-threats-in-the-past-12-months","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/07\/13\/84-of-organizations-experienced-phishing-ransomware-type-threats-in-the-past-12-months\/","title":{"rendered":"84% of Organizations Experienced Phishing &#038; Ransomware Type Threats in the Past 12 Months"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               New Trend Micro study reveals tips on how to mitigate phishing and ransomware                             <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211;\u00a013 July 2021\u00a0&#8211;\u00a0<a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>),&#13;<br \/>\na global&#13;<br \/>\ncybersecurity leader, published new research revealing that half of&#13;<br \/>\nUS organizations are not effective at countering phishing and ransomware&#13;<br \/>\nthreats.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The findings come from an Osterman Research study&#13;<br \/>\ncommissioned by Trend Micro and compiled from interviews with 130 cybersecurity&#13;<br \/>\nprofessionals in mid-sized and large organizations. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>A full copy of the report, <i>How to Reduce the Risk of&#13;<br \/>\nPhishing and Ransomware<\/i>, is available here: <\/b><a href=\"https:\/\/resources.trendmicro.com\/Osterman-Email-Security-WP.html\" title=\"https:\/\/resources.trendmicro.com\/Osterman-Email-Security-WP.html\">https:\/\/resources.trendmicro.com\/Osterman-Email-Security-WP.html<\/a><b\/><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>\u00a0<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Phishing and ransomware were already critical enterprise&#13;<br \/>\nsecurity risks even before the pandemic hit and, as this report shows, the&#13;<br \/>\nadvent of mass remote working has increased the pressure of these threats,&#8221;&#13;<br \/>\nsaid Tony Lee, head of consulting at Trend Micro Hong Kong and Macau.&#13;<br \/>\n&#8220;Organizations need multi-layered defenses in place to mitigate these risks.&#13;<br \/>\nThese range from phishing simulations to advanced threat detection and response&#13;<br \/>\nplatforms like Trend Micro Vision One, which alert security teams before attackers&#13;<br \/>\ncan make an impact.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The study asked respondents to rate their effectiveness&#13;<br \/>\nin 17 key best practice areas related to ransomware and phishing, ranging from&#13;<br \/>\nprotecting endpoints from malware infection to ensuring prompt patching of all&#13;<br \/>\nsystems.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Key takeaways from the report include:<\/p>\n<ul>\n<li>50% rated themselves ineffective overall at&#13;<br \/>\ntackling phishing and ransomware.<\/li>\n<li>72% consider themselves ineffective at&#13;<br \/>\npreventing home infrastructure from being a conduit for attacks on corporate&#13;<br \/>\nnetworks.<\/li>\n<li>Only&#13;<br \/>\n37% believed they were highly effective at following 11 or more of the&#13;<br \/>\nhighlighted best practices.<\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The report&#13;<br \/>\nfurther split the threat landscape into 17 types of security incident and found&#13;<br \/>\n84% of respondents had experienced at least one of these\u2014highlighting the prevalence&#13;<br \/>\nof phishing and ransomware. Most common were successful:<\/p>\n<ul>\n<li>Business&#13;<br \/>\nemail compromise (BEC) attack &#8211; 53%<\/li>\n<li>Phishing&#13;<br \/>\nmessages resulting in malware infection &#8211; 49%<\/li>\n<li>Account&#13;<br \/>\ncompromise &#8211; 47%<\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Phishing&#13;<br \/>\nremains among the top vectors for threat actors. Although it can be the first&#13;<br \/>\nstage in a ransomware attack, it&#8217;s also used in BEC raids, or to infect victims&#13;<br \/>\nwith malware including info-stealers, banking trojans, spyware, crypto-miners,&#13;<br \/>\nand more. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Ransomware&#13;<br \/>\nhas become a modern epidemic, hitting government, hospitals, schools and&#13;<br \/>\nprivate enterprises and any other targets deemed vulnerable to extortion and&#13;<br \/>\ncapable of paying. It results most often in both data loss and potential&#13;<br \/>\nserious IT service outages.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The security&#13;<br \/>\nissues flagged by respondents as most concerning were:<\/p>\n<ul>\n<li>65%&#13;<br \/>\nphishing attempts landing in user inboxes<\/li>\n<li>65%&#13;<br \/>\nusers clicking on phishing links or opening attachments<\/li>\n<li>61%&#13;<br \/>\ndata theft via ransomware actors<\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The report also contains a trove of useful information&#13;<br \/>\nfor organizations including typical attack TTPs, effective mitigations and&#13;<br \/>\ncapabilities to look out for in commercial cybersecurity solutions.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>High success rates for both phishing and ransomware&#13;<br \/>\ncampaigns mean both are likely to intensify over the coming years. The report&#13;<br \/>\nrecommends that organizations embrace the following best practices to mitigate&#13;<br \/>\ncyber-risk:<\/p>\n<ul>\n<li><b>Focus on root causes of compromise<\/b>&#13;<br \/>\nusing a risk-based approach to address the most damaging threats<\/li>\n<li><b style=\"font-size: 1rem\">Improve authentication <\/b><span style=\"font-size: 1rem\">via&#13;<br \/>\nuse of password managers, tweaking policies, monitoring for credential breaches&#13;<br \/>\nand even using passwordless authentication<\/span><\/li>\n<li><b style=\"font-size: 1rem\">Take a people, process and technology&#13;<br \/>\napproach <\/b><span style=\"font-size: 1rem\">including user training, incident response processes and&#13;<br \/>\ntechnology like Vision One to detect and respond to threats early on<\/span><\/li>\n<li><b style=\"font-size: 1rem\">Don&#8217;t wait for a breach<\/b><span style=\"font-size: 1rem\">&#13;<br \/>\nbefore developing an incident response plan. Reach out to law enforcement,&#13;<br \/>\nmanaged services providers, your security vendors, and other key stakeholders&#13;<br \/>\nnow<\/span><\/li>\n<\/ul><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-07-13\/85724\/84-of-organizations-experienced-phishing-ransomware-type-threats-in-the-past-12-months\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New Trend Micro study reveals tips on how to mitigate phishing and ransomware HONG KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211;\u00a013 July 2021\u00a0&#8211;\u00a0 (;),&#13; a global&#13; cybersecurity leader, published new research revealing that half of&#13; US organizations are not effective at countering phishing and ransomware&#13; threats. &#13; &#13; \u00a0 &#13; &#13; The findings come from an Osterman Research &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/16234"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=16234"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/16234\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=16234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=16234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=16234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}