Unlock Exclusive Business Insights
Weekly CEO Interviews & Market Analysis
RE DO Jewellery
Harvish Jewels
P C Chandra
Dr Shailaja
P C Chandra
Dr Shailaja
RE DO Jewellery
Harvish Jewels
Dr Shailaja
RE DO Jewellery
Harvish Jewels
P C Chandra
Join 50K+ Leaders
Monthly Insights
Subscribe Now

Government Joins the Finance Sector at the Top of the Cyber Attack List

2 min read

Business Wire India

New research reveals that cyberattacks on the government sector doubled in 2016, hiking to 14% from 7% of all cyber security attacks in 2015. Attacks on the finance sector also rose dramatically from just 3% in 2015 to 14% of all attacks in 2016.

This Smart News Release features multimedia. View the full release here: http://www.businesswire.com/news/home/20170507005008/en/

The manufacturing sector came in at third place at 13%, while the retail sector, which topped the list of all cybersecurity attacks on all sectors in 2015 moved down into fourth place (11%).

This is according to Dimension Data's Executive's Guide to the NTT Security 2017 Global Threat Intelligence Report, which was compiled from data collected by NTT Security and other NTT operating companies including Dimension Data, from the networks of 10,000 clients across five continents, 3.5 trillion security logs, 6.2 billion attempted attacks, and global ¹honeypots and ² sandboxes located in over 100 different countries.

The report pinpoints a number of global geo-political events which could have contributed to the government sector being a cybersecurity attack target. These include:

  • the US presidential election campaign

  • a new US administration with a more aggressive stance toward China and North Korea

  • China adopting a more aggressive policy stance in securing its vital 'core interests'

  • US and European Union-led economic sanctions against Russia

  • Russian state-sponsored actors continuing cyber operations against Western targets

  • growing negative sentiment in the Middle East against the West's aggression towards Syria

Matthew Gyde, Dimension Data's Group Executive – Security said, "Governments all over the world are constantly under the threat of sophisticated attacks launched by rival nation-states, terrorist groups, hacktivists, and cyber criminals. That's because government agencies hold vast amounts of sensitive information – from personnel records, budgetary data, and sensitive communications, to intelligence findings. What's interesting is that this year we saw numerous incidents involving insider threats

Commenting on the financial services industry, Gyde said the ongoing attacks in the financial services industry is no surprise. "These organisations have large amounts of digital assets and sensitive customer data. Gaining access to them enables cybercriminals to monetise personally identifiable information and credit card data in the underground economy."

Other highlights in the report are:

  • 63% of all cyberattacks originated from IP addresses in the US. The US is the predominant location of cloud-hosted infrastructure globally. Threat actors often utilise public cloud to orchestrate attacks due to the low cost and stability of this infrastructure.

  • Of the IoT attacks detected in 2016, some 66% were attempting to discover specific devices such as a particular model of video camera, 3% were seeking a web server or other type of server, while 2% were attempting to attack a database.

  • The top cybersecurity threats facing digital businesses are phishing, social engineering, and ransomware; business email compromise; IoT and distributed-denial-of-service (DDoS) attacks; and attacks targeting end-users.

Click here to download Dimension Data's Executive's Guide to the 2017 Global Threat Intelligence Report.

Twitter@dimensiondata
LinkedIn: Dimension Data
www.dimensiondata.com/GlobalThreatReport

¹Honeypots: systems built as lures, specifically built to attract attackers, and gather information from cyberattacks directed against the honeypots.
²Sandbox: a testing environment that isolates untested code changes and outright experimentation from the production environment or repository, in the context of software development including Web development and revision control.

View source version on businesswire.com: http://www.businesswire.com/news/home/20170507005008/en/


MULTIMEDIA AVAILABLE :
http://www.businesswire.com/news/home/20170507005008/en/

Follow us on Google News

India’s Luxury & Jewellery Icons 2025

No stories found.

Visionary Women in India 2025

No stories found.

Business Executives in Focus 2025

No stories found.

Dynamic Business Leaders to Watch in 2025

No stories found.

Unlock Exclusive Business Insights

Subscribe Now ↗
RE DO Jewellery - Featured in CEO Magazine
Harvish Jewels - Exclusive CEO Interview
P C Chandra - Business Leadership Insights
Dr Shailaja - Industry Expert Analysis
RE DO Jewellery - Featured in CEO Magazine
Harvish Jewels - Exclusive CEO Interview
P C Chandra - Business Leadership Insights
Dr Shailaja - Industry Expert Analysis
RE DO Jewellery - Featured in CEO Magazine
logo
Business Magazine - Magazines for CEOs | The CEO Magazine
www.theceo.in