{"id":17413,"date":"2019-07-12T00:00:00","date_gmt":"2019-07-11T22:00:00","guid":{"rendered":"https:\/\/www.soundpr.it\/post_news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/"},"modified":"2019-10-02T12:47:43","modified_gmt":"2019-10-02T10:47:43","slug":"it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare","status":"publish","type":"news","link":"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/","title":{"rendered":"IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey"},"content":{"rendered":"<p><\/p>\n<p style=\"text-align: justify;\"><em><strong>Key Survey Findings:<\/strong><\/em><\/p>\n<ul>\n<li>Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads to maximize profits\n<ul>\n<li>Software exploits were the initial cause of 23 percent of incidents and used in 35 percent of cyberattacks, demonstrating how exploits are used at multiple stages of the attack chain<\/li>\n<li>Phishing emails impacted 53 percent of those hit by a cyberattack<\/li>\n<li>Ransomware impacted 30 percent of attack victims<\/li>\n<li>41 percent of attack victims suffered a data breach<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Only 16 percent consider supply chain a top security risk, exposing an additional weak spot\n<ul>\n<li>Nation state adversaries have proven how successful supply chain attacks are, which means common cybercriminals are likely to adopt the attack method<\/li>\n<li>Supply chain attacks are a launch pad to emerging automated, active-adversary attacks<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>IT teams spend 26 percent of their time managing security, yet still struggle with a lack of expertise, budget and up to date technology\n<ul>\n<li>79 percent said recruiting people with the cybersecurity skills they need is challenge<\/li>\n<li>66 percent said their organization\u2019s cybersecurity budget is below what it needs to be<\/li>\n<li>75 percent believe that staying up to date with cybersecurity technology is a challenge<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong>OXFORD, UK \u2013 July 10, 2019\u00a0<\/strong>\u2013 <a href=\"http:\/\/www.sophos.com\">Sophos<\/a> (LSE: SOPH), a global leader in network and endpoint security, today announced the findings of its global survey, <a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/sophos-impossible-puzzle-of-cybersecurity-wp.pdf\">The Impossible Puzzle of Cybersecurity<\/a>, which reveals IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology. The survey polled 3,100 IT decision makers from mid-sized businesses in the US, Canada, Mexico, Colombia, Brazil, UK, France, Germany, Australia, Japan, India, and South Africa.<\/p>\n<p style=\"text-align: justify;\"><strong>Cybercriminals Use Multiple Attack Methods and Payloads for Maximum Impact<\/strong><\/p>\n<p style=\"text-align: justify;\">\u00a0The Sophos survey shows how attack techniques are varied and often multi-staged, increasing the difficulty to defend networks. One in five IT managers surveyed didn\u2019t know how they were breached, and the diversity of attack methods means no one defensive strategy is a silver bullet.<\/p>\n<p style=\"text-align: justify;\">\u201cCybercriminals are evolving their attack methods and often use multiple payloads to maximize profits. Software exploits were the initial point of entry in 23 percent of incidents, but they were also used in some fashion in 35 percent of all attacks, demonstrating how exploits are used at multiple stages of the attack chain,\u201d said Chester Wisniewski, principal research scientist, Sophos. \u201cOrganizations that are only patching externally facing high-risk servers are left vulnerable internally and cybercriminals are taking advantage of this and other security lapses.\u201d<\/p>\n<p style=\"text-align: justify;\">The wide range, multiple stages and scale of today\u2019s attacks are proving effective. For example, 53 percent of those who fell victim to a cyberattack were hit by a phishing email, and 30 percent by ransomware. Forty-one percent said they suffered a data breach.<\/p>\n<p style=\"text-align: justify;\"><strong>Weak Links in Security Increasingly Lead to Supply Chain Compromises<\/strong><\/p>\n<p style=\"text-align: justify;\">Based on the responses, it\u2019s not surprising that 75 percent of IT managers consider software exploits, unpatched vulnerabilities and\/or zero-day threats as a top security risk. Fifty percent consider phishing a top security risk. Alarmingly, only 16 percent of IT managers consider supply chain a top security risk, exposing an additional weak spot that cybercriminals will likely add to their repertoire of attack vectors.<\/p>\n<p style=\"text-align: justify;\">\u201cCybercriminals are always looking for a way into an organization, and supply chain attacks are ranking higher now on their list of methods. IT managers should prioritize supply chain as a security risk, but don\u2019t because they consider these attacks perpetrated by nation states on high profile targets. While it is true that nation states may have created the blueprints for these attacks, once these techniques are publicized, other cybercriminals often adopt them for their ingenuity and high success rate,\u201d said Wisniewski. \u201cSupply chain attacks are also an effective way for cybercriminals to carry out automated, active attacks, where they select a victim from a larger pool of prospects and then actively hack into that specific organization using hand-to-keyboard techniques and lateral movements to evade detection and reach their destination.\u201d<\/p>\n<p style=\"text-align: justify;\"><strong>Lack of Security Expertise, Budget and Up to Date Technology<\/strong><\/p>\n<p style=\"text-align: justify;\">According to the Sophos survey, IT managers reported that 26 percent of their team\u2019s time is spent managing security, on average. Yet, 86 percent agree security expertise could be improved and 80 percent want a stronger team in place to detect, investigate and respond to security incidents. \u00a0Recruiting talent is also an issue, with 79 percent saying that recruiting people with the cybersecurity skills they need is challenge.<\/p>\n<p style=\"text-align: justify;\">Regarding budget, 66 percent said their organization\u2019s cybersecurity budget (including people and technology) is below what it needs to be. Having current technology in place is another problem, with 75 percent agreeing that staying up to date with cybersecurity technology is a challenge for their organization. This lack of security expertise, budget and up to date technology indicates IT managers are struggling to respond to cyberattacks instead of proactively planning and handling what\u2019s coming next<\/p>\n<p style=\"text-align: justify;\">\u201cStaying on top of where threats are coming from takes dedicated expertise, but IT managers often have a hard time finding the right talent or don\u2019t have a proper security system in place that allows them to respond quickly and efficiently to attacks,\u201d said Wisniewski. \u201cIf organizations can adopt a security system with products that work together to share intelligence and automatically react to threats, then IT security teams can avoid the trap of perpetually catching up after yesterday\u2019s attack and better defend against what\u2019s going to happen tomorrow. Having a security \u2018system\u2019 in place helps alleviate the security skills gap IT managers are facing. It\u2019s much more time and cost effective for businesses to grow their security maturity with simple to use tools that coordinate with each other across an entire estate.\u201d<\/p>\n<p style=\"text-align: justify;\"><strong>Synchronized Security Solves the Impossible Puzzle of Cybersecurity<\/strong><\/p>\n<p style=\"text-align: justify;\">With cyberthreats coming from supply chain attacks, phishing emails, software exploits, vulnerabilities, insecure wireless networks, and much more, businesses need a security solution that helps them eliminate gaps and better identify previously unseen threats. Sophos Synchronized Security, a single integrated system, provides this much needed visibility to threats by integrating Sophos endpoint, network, mobile, Wi-Fi, and encryption products to share information in real-time and automatically respond to incidents. More information about <a href=\"https:\/\/www.sophos.com\/en-us\/lp\/synchronized-security.aspx\">Synchronized Security is available at Sophos.com<\/a>.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/sophos-impossible-puzzle-of-cybersecurity-wp.pdf\">The Impossible Puzzle of Cybersecurity<\/a> survey was conducted by Vanson Bourne, an independent specialist in market research, in December 2018 and January 2019. This survey interviewed 3,100 IT decision makers in 12 countries and across six continents in the US, Canada, Mexico, Colombia, Brazil, UK, France, Germany, Australia, Japan, India, and South Africa. All respondents were from organizations with between 100 and 5,000 employees.<\/p>\n<p><\/p>","protected":false},"featured_media":17396,"template":"","news_categories":[147],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey - soundPR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[:it]IT manager sotto assedio: la ricerca Sophos rivela le sfide sempre pi\u00f9 complesse che i responsabili della sicurezza aziendale devono affrontare[:en]IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey[:] - soundPR\" \/>\n<meta property=\"og:description\" content=\"Key Survey Findings: Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads to maximize profits Software exploits were the initial cause of 23 percent of incidents and used in 35 percent of cyberattacks, demonstrating how exploits are used at multiple stages of the attack chain Phishing emails impacted 53 percent of [...]Read More...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/\" \/>\n<meta property=\"og:site_name\" content=\"soundPR\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-02T10:47:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Sophos_Logo_2017_White.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1360\" \/>\n\t<meta property=\"og:image:height\" content=\"834\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/\",\"url\":\"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/\",\"name\":\"[:it]IT manager sotto assedio: la ricerca Sophos rivela le sfide sempre pi\u00f9 complesse che i responsabili della sicurezza aziendale devono affrontare[:en]IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey[:] - soundPR\",\"isPartOf\":{\"@id\":\"https:\/\/www.soundpr.it\/#website\"},\"datePublished\":\"2019-07-11T22:00:00+00:00\",\"dateModified\":\"2019-10-02T10:47:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.soundpr.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.soundpr.it\/#website\",\"url\":\"https:\/\/www.soundpr.it\/\",\"name\":\"soundPR\",\"description\":\"Sound Public Relations\",\"publisher\":{\"@id\":\"https:\/\/www.soundpr.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.soundpr.it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.soundpr.it\/#organization\",\"name\":\"soundPR\",\"url\":\"https:\/\/www.soundpr.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png\",\"contentUrl\":\"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png\",\"width\":168,\"height\":69,\"caption\":\"soundPR\"},\"image\":{\"@id\":\"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[:it]IT manager sotto assedio: la ricerca Sophos rivela le sfide sempre pi\u00f9 complesse che i responsabili della sicurezza aziendale devono affrontare[:en]IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey[:] - soundPR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/","og_locale":"en_US","og_type":"article","og_title":"[:it]IT manager sotto assedio: la ricerca Sophos rivela le sfide sempre pi\u00f9 complesse che i responsabili della sicurezza aziendale devono affrontare[:en]IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey[:] - soundPR","og_description":"Key Survey Findings: Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads to maximize profits Software exploits were the initial cause of 23 percent of incidents and used in 35 percent of cyberattacks, demonstrating how exploits are used at multiple stages of the attack chain Phishing emails impacted 53 percent of [...]Read More...","og_url":"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/","og_site_name":"soundPR","article_modified_time":"2019-10-02T10:47:43+00:00","og_image":[{"width":1360,"height":834,"url":"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Sophos_Logo_2017_White.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/","url":"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/","name":"[:it]IT manager sotto assedio: la ricerca Sophos rivela le sfide sempre pi\u00f9 complesse che i responsabili della sicurezza aziendale devono affrontare[:en]IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey[:] - soundPR","isPartOf":{"@id":"https:\/\/www.soundpr.it\/#website"},"datePublished":"2019-07-11T22:00:00+00:00","dateModified":"2019-10-02T10:47:43+00:00","breadcrumb":{"@id":"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.soundpr.it\/en\/news\/it-manager-sotto-assedio-la-ricerca-sophos-rivela-le-sfide-sempre-piu-complesse-che-i-responsabili-della-sicurezza-aziendale-devono-affrontare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.soundpr.it\/"},{"@type":"ListItem","position":2,"name":"IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up, According to Sophos Global Survey"}]},{"@type":"WebSite","@id":"https:\/\/www.soundpr.it\/#website","url":"https:\/\/www.soundpr.it\/","name":"soundPR","description":"Sound Public Relations","publisher":{"@id":"https:\/\/www.soundpr.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.soundpr.it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.soundpr.it\/#organization","name":"soundPR","url":"https:\/\/www.soundpr.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png","contentUrl":"https:\/\/www.soundpr.it\/wp-content\/uploads\/2019\/07\/Logo-hd-wht.png","width":168,"height":69,"caption":"soundPR"},"image":{"@id":"https:\/\/www.soundpr.it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/news\/17413"}],"collection":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/types\/news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/media\/17396"}],"wp:attachment":[{"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/media?parent=17413"}],"wp:term":[{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/www.soundpr.it\/en\/wp-json\/wp\/v2\/news_categories?post=17413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}