IP Expo: Stop the security incident to prevent the breach

It only takes 1 hr and 58 min for a security incident to turn into a breach, says CrowdStrike

Man reports security breach

It only takes one hour and 58 minutes for a security incident to turn into a full breach of security, says CrowdStrike.

Speaking at a keynote for cybersecurity stories, the company's technology strategist, Zeki Turedi, said that organisations were too slow to deal with initial security incidents.

"On average, it actually takes 63 hours for an organisation to respond to an incident," he said. "That's a pretty long time. Is that 63 hours working 24/7 or is that 63 hours working nine to five? It's a long time to allow an incident to go completely unresponsive or left to one side."

The threat of a cyber attack can come in many forms, often in various guises of malware, and it's a very real threat to organisations and businesses around the world. According to Turedi, there are around one trillion security events every single day and often, people take a long time to patch.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

When a company suffers a security incident, it's usually one machine infected or hacked, and according to Turedi, it takes just one hour and 58 minutes, on average, to move on to other machines and gain the credentials to start a full-scale security breach.

Zeki Turedi during his keynote at IP Expo

"The breakout time is how long on average it takes for one machine to be taken over by a threat actor and then move on to other machines," he said. "The reason why it is important is that when a threat actor is on one machine, that's an incident. When they start moving across to get credentials, that is when an incident turns into a breach.

"We as security practitioners are very happy about security incidents. They're okay. We should be dealing with security incidents, but we do not want to be dealing with breaches."

An uncomfortable fact of modern life is that data breaches are happening. In the last couple of years alone we have seen popular websites like Facebook breached, transport services like British Airways hacked and even organisations like the NHS suffering attacks such as WannaCry.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020