Guest Post | Advt. | Query: info@techrecur.com

Government Joins The Finance Sector At The Top Of The Cyber Attack List


New research reveals that the number of cyberattacks on the government sector doubled from 7% in 2015 to 14% in 2016

London, UK – 8 May 2017 – New research reveals that cyberattacks on the government sector doubled in 2016, hiking to 14% from 7% of all cyber security attacks in 2015. Attacks on the finance sector also rose dramatically from just 3% in 2015 to 14% of all attacks in 2016.

The manufacturing sector came in at third place at 13%, while the retail sector, which topped the list of all cybersecurity attacks on all sectors in 2015 moved down into fourth place (11%).

This is according to Dimension Data’s Executive’s Guide to the NTT Security 2017 Global Threat Intelligence Report, which was compiled from data collected by NTT Security and other NTT operating companies including Dimension Data, from the networks of 10,000 clients across five continents, 3.5 trillion security logs, 6.2 billion attempted attacks, and global honeypots[1] and sandboxes[2] located in over 100 different countries.

The report pinpoints a number of global geo-political events which could have contributed to the government sector being a cybersecurity attack target. These include:

  • the US presidential election campaign
  • a new US administration with a more aggressive stance toward China and North Korea
  • China adopting a more aggressive policy stance in securing its vital ‘core interests’
  • US and European Union-led economic sanctions against Russia
  • Russian state-sponsored actors continuing cyber operations against Western targets
  • growing negative sentiment in the Middle East against the West’s aggression towards Syria

Matthew Gyde, Dimension Data’s Group Executive – Security said, “Governments all over the world are constantly under the threat of sophisticated attacks launched by rival nation-states, terrorist groups, hacktivists, and cyber criminals. That’s because government agencies hold vast amounts of sensitive information – from personnel records, budgetary data, and sensitive communications, to intelligence findings. What’s interesting is that this year we saw numerous incidents involving insider threats

Commenting on the financial services industry, Gyde said the ongoing attacks in the financial services industry is no surprise. “These organisations have large amounts of digital assets and sensitive customer data. Gaining access to them enables cybercriminals to monetise personally identifiable information and credit card data in the underground economy.”

Other highlights in the report are:

  • 63% of all cyberattacks originated from IP addresses in the US, followed by the UK (4%), and China (3%). The US is the predominant location of cloud-hosted infrastructure globally. Threat actors often utilise public cloud to orchestrate attacks due to the low cost and stability of this infrastructure.
  • The Internet of Things (IoT) and operating technology (OT) devices must be considered as both a potential source and target of attack. Of the IoT attacks detected in 2016, some 66% were attempting to discover specific devices such as a particular model of video camera, 3% were seeking a web server or other type of server, while 2% were attempting to attack a database.
  • The top cybersecurity threats facing digital businesses are phishing, social engineering, and ransomware; business email compromise; IoT and distributed-denial-of-service (DDoS) attacks; and attacks targeting end-users.

Click here to download Dimension Data’s Executive’s Guide to the 2017 Global Threat Intelligence Report.

Twitter: https://twitter.com/DimensionData
LinkedIn: https://www.linkedin.com/company/dimension-data

[1]Honeypots: systems built as lures, specifically built to attract attackers, and gather information from cyberattacks directed against the honeypots.
[2]Sandbox: a testing environment that isolates untested code changes and outright experimentation from the production environment or repository, in the context of software development including Web development and revision control.


About Dimension Data
Dimension Data uses the power of technology to help organisations achieve great things in the digital era. As a member of the NTT Group, we accelerate our clients’ ambitions through digital infrastructure, hybrid cloud, workspaces for tomorrow, and cybersecurity. With a turnover of USD 7.5 billion, offices in 58 countries, and 31,000 employees, we deliver wherever our clients are, at every stage of their technology journey. We’re proud to be the Official Technology Partner of Amaury Sport Organisation, which owns the Tour de France, and the title partner of the cycling team, Team Dimension Data for Qhubeka. Visit us at http://www.dimensiondata.com

Have any Question or Comment?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

::::::::::::::::::::::::::::::::::3451:::::::::::::::::::::::::::::::::;;

::::::::::::::::::::::::::::::::::6733:::::::::::::::::::::::::::::::::;;

:::::::::::::::::::::::::::::925:::::::::::::::::::::::::::::::

TRIO STEEL IS ONE OF THE MOST TRUSTED BRAND AND LEADING EXPORTER AND SUPPLIER OF CARBON STEEL, ALLOY STEEL & STAINLESS STEEL PIPES & PIPE FITTINGS MATERIAL. Triosteel is one of the leading Suppliers and Exporters of API 5L Pipe in Singapore. Triosteel also Exports to many countries like Indonesia, Iran, Saudi Arabia & many more. An API 5L pipe is manufactured by adhering to the specifications laid down by the International Organization for Standardization (ISO) 3183.

::::::::::::::3453:::::::::::::

2780

buy! buy! CHEAP! Telefonie VoIP CHEAP! buy! buy! CHEAP!

2781

buy! buy! CHEAP! Telefonie VoIP CHEAP! buy! buy! CHEAP!

——————————————–

For the 2012 MLB period, we found an totals forecast Joao’s Renowned Over/Under João Zorro Gonçalves, Zcode Totals Pro, System of the time with progressions that have been successful over 98 98% ... We eventually perfected our over/under program ( Zcodesystemexclusive ), although it h-AS has brought years of investigation. Five Steps to Making a Winning MLB Method: 1. Execute appropriate cash management tools. 2. MLB rules that are comprehend. 3.Extensive testing back to make sure successful longterm results ...

——————————————–

There is always a challenge when you're dealing with the Foreign Exchange Market. That's just the nature of the beast. The best thing you can do is to learn about how the market operates as a whole so that you will be ready to meet these challenges. iq option penipu Never be misled by any profit gains in binary options. This is the number-one way traders end up losing their money and ultimately failing. Remember that the same things that make you laugh can make you cry in this market, and you can lose that $700.

——————————————–

Learning Polish has never been this fun and easy as with our podcasts Learn Polish with Polishpod101 Start today and become conversational in Polish in no time

——————————————–

The Best Website Agen Poker Resmi www.sakupoker.com Terpercaya come join

——————————————–

Do you need edmonton phone systems service ? Call complete communications today!

——————————————–

High-tech solutions for easy start-up of your IPTV/OTT-business

——————————————–

——————————————–

If you want to purchase not only one item, you have a chance to enjoy privileges. There is a sale’ tab on the site which offers a fantastic range of reduced counterfeit watches and accessories, such as sunglasses, cufflinks, watch straps and pens. Luxury Jewelry Replica At MCA.MN On Sale You get a 5% discount if you buy two pieces, this discount increases to 10% if you buy 4 pieces or more. There is free international shipping on all orders on this site. We also offer customers a free return anytime with a 100% money back guarantee.

——————————————–

:::::::::::::::::3452:::::::::::::::::::