Story image

The security perimeter in organisations is dissolving

18 May 2015

As users reconnect their devices, Monday mornings see a massive increase in malware detection, according to research published in the annual NTT 2015 Global Threat Intelligence Report.

The findings show that the security perimeter in organisations is dissolving, due to end users increasingly using their own devices both inside and outside of the corporate security perimeter.

The report claims IT and security management can no longer count on well-defined network security perimeters to protect their organisations.

The Global Threat Intelligence Report contains analysis of over six billion security events worldwide gathered during 2014 by NTT Group companies including Dimension Data, Solutionary, NTT Com Security, NTT R&D, and NTT Innovation Institute (NTTi3).

Matthew Gyde, Dimension Data’s group executive - Security, says threats targeting end users are higher than ever. In addition, security vulnerabilities are mostly related to end-user systems and not servers.

“It appears that successful exploits occur over the weekend when end users - and their devices - are outside the security controls of the corporate network,” Gyde says. “This indicates that traditional security controls are effective at protecting the corporate network, however assets that transition between corporate and external access points are at greater risk.”

Gyde says controls that address this trend must focus on the user and their devices, regardless of location, and points out that seven of the top 10 vulnerabilities identified were on end-user systems. End users become a liability and that’s because their devices often have many unpatched vulnerabilities.

According to Gyde, the malware industry is maturing, with malware becoming commoditised and available through dark net marketplaces. This means the barrier to entry for cybercriminals is a minimal financial investment, but for a potentially large return.

“And this trend is not about to disappear,” he states. “As users become more accustomed to always-on, real-time access to corporate data, they also become the targets of criminals wanting those same data sources. 

“In summary, users and their devices become the criminal’s entry point.”

Other highlights of the Global Threat Intelligence Report include:

·         Finance continues to represent the number one targeted sector with 18% of all detected attacks.

·         Across the world, 56% of attacks against the NTT global client base originated from IP addresses within the United States. This does not necessarily mean that the attackers reside in the US.

·         76% of identified vulnerabilities throughout all systems in the enterprise were more than two years old, and almost 9% of them were over 10 years old.

·         Of the vulnerabilities discovered across enterprises worldwide, 7 of the top 10 exposed vulnerabilities resided within user systems and not on servers.

·         Threats against the end user are higher than ever, attacks show a clear and continuing shift towards success in compromising the end point.

·         Attacks against Business & Professional Services increased from 9% to 15%.

Opinion: Meeting the edge computing challenge
Scale Computing's Alan Conboy discusses the importance of edge computing and the imminent challenges that lie ahead.
Alibaba Cloud discusses past and unveils ‘strategic upgrade’
Alibaba Group's Jeff Zhang spoke about the company’s aim to develop into a more technologically inclusive platform.
Protecting data centres from fire – your options
Chubb's Pierre Thorne discusses the countless potential implications of a data centre outage, and how to avoid them.
Opinion: How SD-WAN changes the game for 5G networks
5G/SD-WAN mobile edge computing and network slicing will enable and drive innovative NFV services, according to Kelly Ahuja, CEO, Versa Networks
TYAN unveils new inference-optimised GPU platforms with NVIDIA T4 accelerators
“TYAN servers with NVIDIA T4 GPUs are designed to excel at all accelerated workloads, including machine learning, deep learning, and virtual desktops.”
AMD delivers data center grunt for Google's new game streaming platform
'By combining our gaming DNA and data center technology leadership with a long-standing commitment to open platforms, AMD provides unique technologies and expertise to enable world-class cloud gaming experiences."
Inspur announces AI edge computing server with NVIDIA GPUs
“The dynamic nature and rapid expansion of AI workloads require an adaptive and optimised set of hardware, software and services for developers to utilise as they build their own solutions."
Cohesity and Softbank partner to offer data services in Japan
The joint venture asserts it will enable Japanese enterprises to back up, store, manage and derive insights from all of their secondary data and applications.