Targeted APT attacks experienced by one in five security professionals
The poll of 1500 of its members by respected global qualifications body ISACA also discovered that two out of three thought it was only a matter of time before such a highly-targeted attack occurred in their organisations.
Comfortingly, six out of 10 believed their organisations would be able to cope with an APT if it happened with more than half claiming they had an incident management plan already in place.
Eighty percent of those who thought themselves likely victims said they were "very prepared."
Can surveys be believed, even ones that pick on a meaningful cross-section of the very professionals whose job it is to defend against them?
In the case of ISACA's poll, probably. APTs are a relatively new concept and the survey did uncover a believable confusion about the term and its implications.
More than half said they did not believe that APTs differed from conventional security threats - a slightly complacent attitude - although the majority did correctly identify intellectual property as most at risk from APT incursions.
Sixty percent said they defended against the possibility of an APT by monitoring logs, accepted as a critical part of a defence against the threat.
Eight out of ten mentioned antivirus as a primary defence despite plenty of anecdotal evidence that this layer is ineffective in defending against targeted attacks.
"Traditional cyberthreats often move right on if they cannot penetrate their initial target, but an APT will continually attempt to penetrate the desired target until it meets its objective, said ISACA spokesperson and Intralot Group head of information security, Christos Dimitriadis.
"Once it does, it can disguise itself and morph when needed, making it difficult to identify or stop."
A major issue remained that too many firms relied on conventional perimeter security to stop APTs, ignoring the inadequancy of this design to cope with threats entering through mobile and BYOD computing.
"Enterprises are under attack and they don't even know it. Bringing this awareness into the curriculum of education for security professionals is necessary to enable them to build the custom defense they need to combat these targeted attacks," commented Trend Micro vice president Tom Kellermann, whose company sponsored the ISACA report.
Follow CIO on
Download CIO for your tablet here.
Click here to subscribe to CIO.
Sign up to receive free CIO newsletters.
Send news tips to email@example.com
Chief flexibility officer: The next CIO role?
The world is changing so quickly, and every company's business model has to change as well, says V.C. Gopalratnam, vice president, IT at Cisco. 'You really have to build an organisation that is as flexible as hell.'
Rob Fyfe receives CIO Lifetime Contribution Award
Cited for 'his approach to innovation and his courage and leadership in supporting technology based initiatives' as CIO and CEO at Air New Zealand.
CONNECT WITH @ CIO NZ
CIO is bringing together the best of MIS NZ and CIO, the new look CIO is the only magazine that focuses on the unique management needs of senior IT professionals.
Get the latest news from CIO delivered via email.
MIS 100 REPORT
The definitive guide to New Zealand's largest and most significant ICT users.
READ NOW »