Skip to main content
Articles

Cisco 2018 Annual Cybersecurity Report

By May 4, 2018#!28Thu, 28 Feb 2019 10:40:22 -0300p2228#28Thu, 28 Feb 2019 10:40:22 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:40:22 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:40:22 -03004010402amThursday=904#!28Thu, 28 Feb 2019 10:40:22 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:40:22 -0300p2228#/28Thu, 28 Feb 2019 10:40:22 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:40:22 -0300pAmerica/Sao_Paulo2#No Comments

See important security trends and the latest cyber threat intelligence.

Discover security insights and key discoveries, download the report official cybersecurity Cisco

Main points addressed in the report:

  • Malware evolution
    Malware is becoming more dangerous. And harder to fight. We now face everything from network ransomware worms to devastating malware. At the same time, opponents are becoming more skilled at creating malware that can escape traditional sandboxing.

 

  • Encrypted and malicious web traffic
    50% of global web traffic has been encrypted as of 2017. The purpose of encryption is to enhance security. But also provide malicious agents with an efficient tool to hide command and control activity. These agents have more time to do damage.

 

  • Increased Artificial Intelligence (AI)
    Encryption also reduces visibility. More companies are turning to the learning machine and artificial intelligence. With these features, they can detect unusual patterns in large volumes of encrypted web traffic. Security teams can investigate further.

 

  • The #8220; peak attacks & #8221; grow in complexity, frequency and duration.
    In one study, 42% companies experienced this type of DDoS attack in 2017. In most cases, recurring peaks lasted only a few minutes.

 

  • Internal Threats: Some rogue users can have a big impact.
    Only 0.5% of users were flagged for suspicious downloads. On average, these suspicious users were responsible for 5,200 document downloads.

 

  • Many new domains were linked to spam campaigns.                                                                   Most of the malicious domains we reviewed, approximately 60%, were associated with spam campaigns.

 

  • More TO and IoT attacks are on the horizon.
    31% of security professionals stated that companies have already experienced cyber attacks on TO infrastructure.

 

  • Security is seen as an essential benefit of hosting cloud networks.
    Use of public and on-premises cloud infrastructure is growing. Security is the most common benefit of hosting cloud networks, say security team respondents.

Download on here the full report:

Leave a Reply