• Latest
  • Trending
Hackers Can Penetrate 93% of Local Networks

Hackers Can Penetrate 93% of Local Networks

December 21, 2021
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Friday, 23 May, 2025
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Hackers Can Penetrate 93% of Local Networks

Cyber-attackers

by ITECHNEWS
December 21, 2021
in Infosec
0 0
0
Hackers Can Penetrate 93% of Local Networks

Cyber-attackers can breach 93% of organizations’ network perimeters and gain access to their resources, according to new research from Positive Technologies.

The study showed results from the company’s penetration testing projects in the second half of 2020 and the first half of 2021. In the 93% of cases where the team was able to penetrate local company networks, it only took them an average of two days to do so.

YOU MAY ALSO LIKE

Data Leak Hits Thousands of NHS Workers

EU Cybersecurity Agency Warns Against Chinese APTs

In addition, the researchers were able to confirm the feasibility of 71% of “unacceptable events” that 20% of the organizations requested being checked. These events included the disruption of technological processes and the provision of services, as well as the theft of funds and important information. All of these events could be conducted in under a month, with attacks on some systems taking only a matter of days.

Another worrying finding was that an insider could gain complete control over the infrastructure of 100% of organizations.

The organizations included in the analysis came from a range of vital sectors, including finance (29%), fuel and energy (18%), government (16%), industrial (16%) and IT (13%).

The most common way of penetrating a corporate network was credential compromise (71% of organizations). This mainly resulted from easily guessable passwords, including for accounts used for system administration.

The researchers added that most organizations had no network segmentation by business processes, enabling threat actors to develop several attack vectors simultaneously.

Ekaterina Kilyusheva, head of research and analytics, Positive Technologies, commented: “In order to build an effective protection system, it is necessary to understand what unacceptable events are relevant for a particular company. Going down the path of the business process from unacceptable events to target and key systems, it is possible to track their relationships and determine the sequence of protection measures in use.

“To make it more difficult for an attacker to advance inside the corporate network toward the target systems, there are a number of interchangeable and complementary measures organizations can take, including separation of business processes, configuration of security control, enhanced monitoring and lengthening of the attack chain. The choice of which technology solutions to use should be based on the company’s capabilities and infrastructure.”

Source: James Coker Reporter
Via: Infosecurity Magazine
Tags: Cyber-attackersLocal Networks
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version