Cyber Attackers Don’t Need to Rush

Cyber Attackers Don’t Need to Rush

Yesterday, Excellus BlueCross/BlueShield announced yet another data breach, exposing 10.5 million records. That sounds like a lot (and it is), but the real eye-popping figure is how much time the attackers had to work with before the compromise was detected. In the Excellus case, the compromise started on December 23, 2013, and wasn’t discovered until August 5, 2015. That’s 590 days. And as other prominent breaches have shown, attackers need far less time than that to do damage.


Anthem lost 80 million records in 48 days, Target lost 40 million credit and debit cards in 33 days, and the Office of Personnel Management lost 21 million detailed personnel records in in 182 days. Ponemon Institute research points to an average detection time of 98 days.

Network and threat monitoring is never going to solve this problem. Data volume is only increasing, attacks are only becoming more sophisticated in their ability to obfuscate themselves, and users are doing more and more through encrypted channels on under-protected systems.

Only organizations that can overcome their squeamishness about addressing the problem where it begins, on the endpoints, will ever be able to reduce these times and prevent these breaches. One corrupted system results in a swarm of new events, additional corrupted systems, and typically a well-concealed jumping-off point for additional attacks and data theft. It is well-past time to stop the attacks where and when they start.

要查看或添加评论,请登录

Jack Danahy的更多文章

  • Another Real-World Impact from Cyberattacks

    Another Real-World Impact from Cyberattacks

    Recent research into the impacts of cyberattacks on municipal financing is showing an unexpected source of ongoing…

    2 条评论
  • Centralization or Platformization?

    Centralization or Platformization?

    Getting the Job Done During a recent presentation I was giving, I got questions on “platformization” from some private…

  • The Biggest Challenge in Cybersecurity: Communication

    The Biggest Challenge in Cybersecurity: Communication

    In our jobs, we’re trying to keep up with new attacks, new vulnerabilities, new enabling technologies, and a cybercrime…

    9 条评论
  • We've Reached a Cybersecurity Turning Point

    We've Reached a Cybersecurity Turning Point

    The US Supreme Court has overturned one of the early cybersecurity regulation and standards catalysts: the “Chevron…

    5 条评论
  • CISO's & Damocles have too much in common

    CISO's & Damocles have too much in common

    Let's relieve the CISO's stress. The “Sword of Damocles” is a great analog for the pressure that CISO’s feel, waiting…

    4 条评论
  • Clarity of SMB security risks paves the path for improvement

    Clarity of SMB security risks paves the path for improvement

    In the Alert Logic Critical Watch Report released today, you’ll find confirmation that SMB’s are feeling exposed by…

    1 条评论
  • Cybersecurity needs to become a Primary issue

    Cybersecurity needs to become a Primary issue

    In spite of its priority in the minds of CEO's and CIO's, cybersecurity remains a "low-energy" issue for primary…

    1 条评论
  • IBM Researcher Shrinks a Dridex Signature Gap

    IBM Researcher Shrinks a Dridex Signature Gap

    Our own Rick the Researcher was taking a look at a new sample of long-lived financial malware family Dridex ( V.3.

  • Cybersecurity Awareness is All About Us

    Cybersecurity Awareness is All About Us

    This October is the 11th annual National Cybersecurity Awareness Month (NCSAM), and, once again, we’re reminding each…

    3 条评论
  • A Plan to Inspire Users to Change

    A Plan to Inspire Users to Change

    After spending the last couple of years researching a new technical approach to solving the endpoint security problem…

社区洞察

其他会员也浏览了