IP Expo: Stop the security incident to prevent the breach

It only takes 1 hr and 58 min for a security incident to turn into a breach, says CrowdStrike

Man reports security breach

It only takes one hour and 58 minutes for a security incident to turn into a full breach of security, says CrowdStrike.

Speaking at a keynote for cybersecurity stories, the company's technology strategist, Zeki Turedi, said that organisations were too slow to deal with initial security incidents.

"On average, it actually takes 63 hours for an organisation to respond to an incident," he said. "That's a pretty long time. Is that 63 hours working 24/7 or is that 63 hours working nine to five? It's a long time to allow an incident to go completely unresponsive or left to one side."

The threat of a cyber attack can come in many forms, often in various guises of malware, and it's a very real threat to organisations and businesses around the world. According to Turedi, there are around one trillion security events every single day and often, people take a long time to patch.

Advertisement - Article continues below
Advertisement - Article continues below

When a company suffers a security incident, it's usually one machine infected or hacked, and according to Turedi, it takes just one hour and 58 minutes, on average, to move on to other machines and gain the credentials to start a full-scale security breach.

Zeki Turedi during his keynote at IP Expo

"The breakout time is how long on average it takes for one machine to be taken over by a threat actor and then move on to other machines," he said. "The reason why it is important is that when a threat actor is on one machine, that's an incident. When they start moving across to get credentials, that is when an incident turns into a breach.

"We as security practitioners are very happy about security incidents. They're okay. We should be dealing with security incidents, but we do not want to be dealing with breaches."

An uncomfortable fact of modern life is that data breaches are happening. In the last couple of years alone we have seen popular websites like Facebook breached, transport services like British Airways hacked and even organisations like the NHS suffering attacks such as WannaCry.

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now


internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

cloud computing

Google Cloud snaps up multi-cloud analytics platform for $2.6bn

13 Feb 2020

How to use Chromecast without Wi-Fi

5 Feb 2020
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
cyber attacks

Apple Mac malware detections overtake Windows the first time

11 Feb 2020