Over 20 Percent Indian IT Managers Believe IoT Threats Top Security Risk
Businesses facing cyber threats from supply chain attacks, phishing emails, software exploits, vulnerabilities and insecure wireless networks, need a security solution to eliminate gaps and identify unseen threats.
With Indian IT managers being inundated with cyberattacks coming from all directions as cybercriminals exploit the weak links in security leading to supply chain or third-party vendor compromises, 27 per cent of them consider Internet of Things (IoT) as threats while 21 per cent feel the internal staff are the top security risks, a new survey by global cybersecurity major Sophos said on Tuesday. However, alarmingly, only 24 per cent of IT managers consider supply chain as a top security risk, exposing an additional weak spot that cybercriminals will likely add to their repertoire of attack vectors.
The survey polled 3,100 IT decision-makers from mid-sized businesses in the US, Canada, Mexico, Colombia, Brazil, the UK, France, Germany, Australia, Japan, India and South Africa. "Cybercriminals are always looking for a way into an organisation, and supply chain attacks are ranking higher on their list of methods now. IT managers should prioritise supply chain as a security risk, but they don't because they consider these attacks are perpetrated by nation-states on high profile targets.
"While it is true that nation-states may have created the blueprints for these attacks, once these techniques are publicised, other cybercriminals often adopt them for their ingenuity and high success rate," Sunil Sharma, Managing Director (Sales), Sophos India and SAARC, said in a statement. With cyber threats coming from supply chain attacks, phishing emails, software exploits, vulnerabilities and insecure wireless networks, businesses need a security solution that helps them eliminate gaps and better identify previously unseen threats.
"Supply chain attacks are also an effective way for cybercriminals to carry out automated, active attacks, where they select a victim from a larger pool of prospects and then actively hack into that specific organisation using hand-to-keyboard techniques and lateral movements to evade detection and reach their destination," Sharma added.
Get the best of News18 delivered to your inbox - subscribe to News18 Daybreak. Follow News18.com on Twitter, Instagram, Facebook, Telegram, TikTok and on YouTube, and stay in the know with what's happening in the world around you – in real time.
Recommended For You
- Happy Daughter’s Day 2019: Meet the Famous Father-Daughter Duo of Bollywood
- 'Bhindi,' Coconut, 'Hing' and Raw Turmeric: Chefs Reveal Their Most Hated Ingredients
- Maruti Suzuki S-Presso Mini SUV Officially Teased Ahead of September 30 Launch: Watch Video
- OnePlus 7 Pro, OnePlus 7 Get OxygenOS 10 Based on Android 10 Update
- Photos Show How Greta Thunberg's Supporters Grew from Two, to Millions In Just a Year