IBM's Global Cybersecurity Report: What to Remember?

IBM's Global Cybersecurity Report: What to Remember?

February 19, 2020 Off By admin

According to US firm IBM, more than 8.5 billion of the data would have been compromised in 2019.

We note that through this study, the problem of the compromise of computer data is up by about 200% compared to 2018.

IBM's report on the various computer security threats observed throughout 2019 is titled the IBM X-Force Threat Intelligence Index.

This article will also interest you: Review of computer attacks in 2019: ransomware largely in the lead

IBM X Force Threat Intelligence Vice President Wendi Whitmore noted that "the volume of exposed files is such" that hackers can simply settle for the data they've been able to recover during all these waves of hacking to operate from now on. This obviously puts pressure on companies to increase their investment in security. Above all, demand as much as possible on the famous multi-factor authentication. The issue today is cyber resilience. It is not only the data of the companies that is at stake but also that of the users.

In addition, IBM X-Force's report highlights 5 major points:

A record in terms of compromise of records on year

in taking stock of the issues that were compromised during the year either by computer attacks or data leaks regardless of the reasons for this leak, the record of 8.5 billion was reached. Not to repeat yourself some would say a bad record. Referring to the report revealed that 7 billions of these folders we were compromised because of poorly configured servers or simply because of poorly protected server. As a result, compared to the 50% of reports in 2018, 2019 we had 86%

The proliferation of ransomware and other programs Malicious

2019 has been qualified for the majority of researchers in computer security as the year of the ransomware. There is no almost had a month without a ransomware attack in 2019. On the other hand other malware has also proliferated. From the cryptomineur to the horse Troy, the world's computer systems have had their share of surprises and damage. The worst part of all this is that their use has not been limited traditional targets such as SMEs. But several sectors have been the most most affected areas such as health and health local authorities. Their financial reach has been more than substantial. a " destructive malware attack costs an average of $239 million per affected, more than 60 times more than the average cost of a (Ponemon Institute)," the report's authors served.

An increase in the practice of phishing

According to the IBM report, 31% of computer attacks operated through the phishing method. This classic method of for the hacker to push an individual to provide him with personal or business information by impersonation as either a web platform or for someone he is supposed to be used to dealing with. The facts demonstrate this, and this method remains so far one of the main means for hackers to initiate their various attacks. Behind phishing, there is vulnerability exploitation which accounts for 30 per cent of the methods used and 29% for identity theft

The vulnerability of the financial sector

The sector that was most affected by the wave of piracy 2019 was the year for finance. With the different policies dematerialization of financial transactions as well as other services financial ancillary, hackers began to see it as a opportunity, an opportunity that was of course seized without a doubt. In 2019 as in 2018 this sector was the most affected. If the financial sector is in top 10 cybersecurity victims of 2019, it is closely followed by the health, public administration, health and public administration sectors, education, as well as trade. But towards the end of the year it was there has been a strong trend towards the Internet of Things.

Hackers and Control Systems industrial.

Industrial Control Systems and operational technologies have also been targeted by hackers. IBM X-Force experts have observed an evolution of about 2000 percent.

Now access an unlimited number of passwords:

Check out our hacking software