IP Expo: Stop the security incident to prevent the breach

It only takes 1 hr and 58 min for a security incident to turn into a breach, says CrowdStrike

Man reports security breach

It only takes one hour and 58 minutes for a security incident to turn into a full breach of security, says CrowdStrike.

Speaking at a keynote for cybersecurity stories, the company's technology strategist, Zeki Turedi, said that organisations were too slow to deal with initial security incidents.

"On average, it actually takes 63 hours for an organisation to respond to an incident," he said. "That's a pretty long time. Is that 63 hours working 24/7 or is that 63 hours working nine to five? It's a long time to allow an incident to go completely unresponsive or left to one side."

The threat of a cyber attack can come in many forms, often in various guises of malware, and it's a very real threat to organisations and businesses around the world. According to Turedi, there are around one trillion security events every single day and often, people take a long time to patch.

Advertisement
Advertisement - Article continues below

When a company suffers a security incident, it's usually one machine infected or hacked, and according to Turedi, it takes just one hour and 58 minutes, on average, to move on to other machines and gain the credentials to start a full-scale security breach.

Zeki Turedi during his keynote at IP Expo

"The breakout time is how long on average it takes for one machine to be taken over by a threat actor and then move on to other machines," he said. "The reason why it is important is that when a threat actor is on one machine, that's an incident. When they start moving across to get credentials, that is when an incident turns into a breach.

"We as security practitioners are very happy about security incidents. They're okay. We should be dealing with security incidents, but we do not want to be dealing with breaches."

An uncomfortable fact of modern life is that data breaches are happening. In the last couple of years alone we have seen popular websites like Facebook breached, transport services like British Airways hacked and even organisations like the NHS suffering attacks such as WannaCry.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019