Most Hackers Can Steal Data Within 24 Hours

More than three-quarters (88 percent) of hackers can break through cybersecurity defenses and into the systems they target within 12 hours, while 81 percent say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.

The Nuix Black Report is the result of a confidential survey of 70 professional hackers and penetration testers at DEFCON, the world's largest hacking and security conference.

Chris Pogue, Nuix's Chief Information Security Officer and a co-author of the Nuix Black Report. "There is no shortage of cybersecurity industry reports so we've avoided going down the familiar path of compiling data about incidents that have already taken place or highlighting trends and patterns in data breaches—these are clearly the symptoms of a deeper problem."

By examining the security landscape from the hacker's perspective, the report has revealed results that are contrary to the conventional understanding of cybersecurity. For example:

Respondents said traditional countermeasures such as firewalls and antivirus almost never slowed them down but endpoint security technologies were more effective at stopping attacks.
More than half of respondents changed their methodologies with every target, severely limiting the effectiveness of security defenses based on known files and attacks.
Around one-third of attackers said their target organizations never detected their activities.
"Data breaches take an average of 250–300 days to detect—if they're detected at all—but most attackers tell us they can break in and steal the target data within 24 hours," said Pogue. "Organizations need to get much better at detecting and remediating breaches using a combination of people and technology."

"The Nuix Black Report illuminates the true nexus between attacker methodology and defensive posture; showing which countermeasures will improve security and which are a waste of money and resources," said Pogue. "Readers will learn what is the best spend for their security dollar and, more critically, why."

Read more: https://www.nuix.com/white-papers/black-report
 

Suggested Articles

A reverse engineering of smart home devices found security issues with bootloaders, outdated operating systems, passwords, and more.

4D imaging radar helps cars see objects better than before, including bridge and tunnel clearances

Siemens has built rugged industrial PCs on the new Atom x6000E series to add graphics for machine vision on the shop floor