Story image

Gen V cyber attacks are here, but most firms are 10 years behind, says Check Point

13 Apr 2018

Security vendor Check Point believes that the age of Gen V cyber threats is now upon us, but organisations’ security defences are at least 10 years and two generations behind.

Check Point’s chief marketing officer Peter Alexander explains what Gen V (5th generation) cyber threats are:

“We’re seeing a new generation of cyber-attacks – powered by leaked state-sponsored technology, these ‘Gen V’ attacks are multi-vector, fast-moving, and mega-scaled.”

The company says that cybersecurity also follows generations; but 50% of the 443 respondents polled for Check Point’s Achieving Fifth Generation Cyber Security report believe their security solutions are outdated.

“77% of CISOs expressed concern that their organizations aren’t equipped to handle these modern day attacks, and the vast majority of organizations’ security infrastructures are woefully outdated,” adds Alexander.

The report says that only 3% of organizations are using threat prevention that includes cloud and mobile security – these make up Gen V security to protect against large-scale, multi-vector attacks.

More than 300 mobile apps in trusted and reputable app stores are infected with malware, the report notes. Cryptomining attacks, cloud threats, Mac and IoT vulnerabilities are also increasing.

However some organizations are even slower to realize that threat prevention is key. 79% rely on security solutions that are at least two generations behind the ability to block Gen V attacks.

 Enterprises that secure their networks in detection-only mode (alerting but not blocking a breach), experienced 79% more attacks than those using solutions in prevention mode (blocking attacks immediately on detection).

“No public or private enterprise is immune; hospitals, city governments and global corporations are all at risk, yet 97% of all organizations are not equipped to deal with these Gen V mega attacks, and this needs to change,” adds Enterprise Strategy Group senior cybersecurity analyst Doug Cahill.

The biggest barriers to achieving higher levels of security were staffing challenges (70%), security conflicting with business or user experience (56%) and outdated security infrastructures (50%).

“In staffing issues security professionals are referring to low numbers of cyber security staff as well as lack of staff knowledge needed to fight 2018 cybercrime. When it comes to outdated security, security professionals are mentioning outdated security architecture as well as controls,” the report says.

These challenges have prevented an adequate level of preparedness for cyber attacks. Most security professionals an average of 3.56 on a 1-5 readiness scale. Only 23% had a pre-defined recovery plan in place.

The survey was conducted among 443 IT and Security professionals worldwide during January and February 2018.

Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.