Some businesses can't even tell if they've been hit by hackers

security
(Image credit: Shutterstock / Sashkin)

Despite cybersecurity being a significant concern for the majority of companies, many still wouldn’t be able to tell if their endpoints had been compromised, or not. However this news may not be as bad as it sounds.

Cybersecurity researchers from Nozomi Networks found over a third (35%) of businesses did not know if their organization had been compromised. However, last year, the figure stood at 48%, signaling a solid improvement in visibility. 

Furthermore, a quarter (24%) were confident they hadn't had an accident this year, twice as many compared to the same time last year. 

More money, fewer incidents

Overall, the number of respondents admitting to having suffered a data breach in the last 12 months went down, year-on-year, from 15% to 10.5%. A third of those (35%) said the engineering workstation was an initial infection vector (twice as many, compared to 18.4% last year).

All of these improvements seem to be coming from rising cybersecurity budgets, the report’s authors are suggesting. Two-thirds (66%) said their control system security budget rose in the last two years (up from 47% a year ago), with 56% saying they’re able to detect a compromise within 24 hours (up from 51%). More than two-thirds (69%) can now move from detection to containment within 6-24 hours. 

Almost nine in ten (87.5%) audited their OT/control systems or networks for security issues in the last year (up from 75.9%), while a third (29%) implemented a continual assessment program. Many monitor their OT system security (83%), with 41% of those using a dedicated OT SOC.

“In the last year, Nozomi Networks researchers and the ICS cybersecurity community have witnessed attacks like Incontroller move beyond traditional targets on enterprise networks, to directly targeting OT,” said Nozomi Networks Co-founder and CPO Andrea Carcano. 

“While threat actors are honing their ICS skills, the specialized technologies and frameworks for a solid defense are available. The survey found that more organizations are proactively using them. Still, there’s work to be done. We encourage others to take steps now to minimize risk and maximize resilience,” Carcano concluded.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
security
The true cost of a security breach
A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
Third-party data breaches have become a major security concern
Cyber-security
Many firms see cyberattacks as their top business concern this year
Hacker Typing
Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
Classroom
Many schools still don’t have basic cybersecurity measures, research reveals
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
Scam alert
A new SMS energy scam is using Elon Musk’s face to steal your money
Representational image of a cybercriminal
Allstate sued for exposing personal customer information in plaintext
Latest in News
Vision Pro Metallica
Apple Vision Pro goes off to never never land with Metallica concert footage
Mufasa is joined by another lion, a monkey and a bird in this promotional image
Mufasa: The Lion King prowls onto Disney+ as it finally gets a streaming release date
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
An Nvidia GeForce RTX 4060 on a table with its retail packaging
Nvidia RTX 5060 GPU spotted in Acer gaming PC, suggesting rumors of imminent launch are correct – and that it’ll run with only 8GB of video RAM
Indiana Jones talking to a friend in a university setting with a jaunty smile on his face
New leak claims Indiana Jones and the Great Circle PS5 release will come in April
A close up of the limited edition vinyl turntable wrist watch from AndoAndoAndo
This limited-edition timepiece turns the iconic Technics SL-1200 turntable into a watch, and I want one