{"id":18951,"date":"2021-10-06T11:48:57","date_gmt":"2021-10-06T15:48:57","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/top-5-challenges-security-economics\/18951\/"},"modified":"2022-11-28T22:12:09","modified_gmt":"2022-11-28T18:12:09","slug":"top-5-challenges-security-economics","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/top-5-challenges-security-economics\/18951\/","title":{"rendered":"Infosec&#8217;s top 5 challenges"},"content":{"rendered":"<p>No company is immune to every sophisticated attack. For example, any company might face a takedown by zero-day vulnerabilities or nonstandard, complex tools. To successfully repel an advanced attack and minimize negative consequences, prepare today for the challenges your cybersecurity team could encounter tomorrow.<\/p>\n<p>Predicting a specific attack is, of course, impossible, so our colleagues decided to study the experiences of other companies, interviewing representatives of a variety of companies for our <a href=\"https:\/\/calculator.kaspersky.com\/report\" target=\"_blank\" rel=\"noopener nofollow\">IT Security Economics 2021 report<\/a>. What the respondents had in common was they had all suffered complex cyberincidents.<\/p>\n<p>Here are the Top 5 concerns the respondents reported:<\/p>\n<h2>1.Insufficient infrastructure visibility<\/h2>\n<p>Logically enough, without full visibility of the infrastructure, threat search and elimination is nearly impossible. Even fairly complex incidents can go unnoticed by cyberdefenders for quite some time. Moreover, reacting without a full understanding of the situation can worsen matters.<\/p>\n<p><strong>Countermeasures. <\/strong>When it comes to providing infrastructure visibility, consider <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Endpoint Detection and Response<\/a>\u2013class solutions.<\/p>\n<h2>2.Lack of coordination<\/h2>\n<p>Disparate teams leaping into action instead of coordinating first tends to increase damage and complicate investigation. Teams can also unintentionally hinder one another (for example, IS may try to isolate the infected server from the network while IT is fighting to keep it available).<\/p>\n<p><strong>Countermeasures. <\/strong>Develop a contingency plan in advance, and appoint someone to be responsible for implementing it.<\/p>\n<h2>3.Lack of qualified personnel<\/h2>\n<p>The market continues to suffer from a shorta<br>\nge of infosec experts, so it is hardly surprising that companies cite as a major challenge the lack of properly trained personnel able to identify threats and respond to critical incidents.<\/p>\n<p><strong>Countermeasures. <\/strong>If in-house expertise is lacking, bring in outside teams to perform both <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/incident-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">incident response<\/a> and continuous <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">monitoring and threat hunting<\/a>.<\/p>\n<h2>4.Failure to identify real threats among multiple signals<\/h2>\n<p>It\u2019s bad if your security system fails to spot dangerous symptoms in the infrastructure, but not much better if it sees too many. Alerts about real threats can get lost among thousands of diverse incidents, each of which wastes analysts\u2019 attention and other valuable resources. In a complex network, that\u2019s a very real problem.<\/p>\n<p><strong>Countermeasures. <\/strong>Use <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security\/endpoint-security-solution?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">comprehensive cybersecurity framework<\/a> with built-in technologies that help to prioritize truly critical incidents.<\/p>\n<h2>5. Insufficient visibility of malicious events or behavior<\/h2>\n<p>Cybercriminals are forever coming up with new attack methods, tools, and exploits. Without fresh information about cyberthreats, security solutions cannot respond to the latest attacks or recognize intruders in the corporate network.<\/p>\n<p><strong>Countermeasures.<\/strong> Supply your security solutions and SIEM systems (if any) with essential, up-to-date <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/threat-intelligence?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">threat intel<\/a>.<\/p>\n<p>The IT Security Economics 2021 report contains a wealth of other useful information such as data on average corporate losses from cyberincidents. You can <a href=\"https:\/\/calculator.kaspersky.com\/report\" target=\"_blank\" rel=\"noopener nofollow\">download the full report here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Security Economics 2021 report: Infosec\u2019s top 5 challenges dealing with complex incidents.<\/p>\n","protected":false},"author":2706,"featured_media":18952,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2291,1552,268],"class_list":{"0":"post-18951","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-reports","10":"tag-threat-intelligence","11":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top-5-challenges-security-economics\/18951\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top-5-challenges-security-economics\/23475\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/top-5-challenges-security-economics\/9504\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top-5-challenges-security-economics\/25548\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top-5-challenges-security-economics\/23622\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top-5-challenges-security-economics\/23044\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top-5-challenges-security-economics\/26215\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top-5-challenges-security-economics\/25745\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top-5-challenges-security-economics\/31664\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top-5-challenges-security-economics\/10136\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top-5-challenges-security-economics\/42347\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top-5-challenges-security-economics\/17856\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top-5-challenges-security-economics\/18260\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/top-5-challenges-security-economics\/15391\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top-5-challenges-security-economics\/27543\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top-5-challenges-security-economics\/31808\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/top-5-challenges-security-economics\/27699\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top-5-challenges-security-economics\/24470\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top-5-challenges-security-economics\/29827\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top-5-challenges-security-economics\/29626\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/reports\/","name":"reports"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18951"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18951\/revisions"}],"predecessor-version":[{"id":20426,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18951\/revisions\/20426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18952"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}