Categories: Tech

It takes two days to respond to hacker attacks

Response time to hacker attacks, on average, beats the two working days. According to data from Deep Instinct, the company that created a deep learning framework for cybersecurity, this means that the87% of experts think they are unprepared to prevent ransomware and malware attacks.

Response time to hacker attacks exceeds two days

According to the semi-annual data of Voice of SecOps, conducted by Deep Instinct, the average global response to a cyber attack is 20,9 ore. More than two working days, including overtime. Italy is positioned in the middle of the table, almost perfectly on average with 21 hours. The best are the Dutch technicians with 17.2 hours, while Sweden comes last with 25.5 hours.

This means that the answer often comes late, when there is a risk that the hackers have already done damage. In addition, professionals think that responding to their colleagues’ cyber threats is inadequate. L’86% does not trust that those who work with them do not click on malicious links and metaphorically open the door for hackers.

In addition to the long lead times and the training of colleagues, the fear of facing malware never seen before is high (44%). But also high lack of qualified SecOps personnel, especially in the healthcare sector (52%) and the public sector (55%). Endpoints are also poorly protected. 99% think that not all entrances to the company network are protected. Another risk factor for 80% of respondents is files stored in the cloud, with 68% fearing that colleagues might upload malicious files without knowing it.

Guy Caspi, CEO of Deep Instinct, explains: “Ransomware and malware attacks are not going away anytime soon. That’s why organizations need to better position themselves to combat potential threats with a prevention-before-execution approach. The survey results shed light on the multiple challenges security teams face on a daily basis and provide insights into the serious demands facing the industry. This research highlights gaps in organizations’ security posture, including lack of comprehensive endpoint coverage, exposure to cloud storage, and uploading malicious files from internal sources to production systems. “

You can learn more about the data analyzed at this address. Instead you can find the Deep Instinct tools, which allow you to prevent rather than wait two days after the attacks, on the official website.

Published by
Walker Ronnie

Recent Posts

Stellar Blade: What is the game length of Shift Up?

How long is Stellar Blade, the new Shift Up title released exclusively for PlayStation 5?…

15 mins ago

The Boys: a new trailer for the fourth season

Amazon has released the new official trailer for the fourth season of The Boys, the…

18 mins ago

David di Donatello 2024: the complete list of all the winners!

Let's discover together, in this dedicated article, the complete list of all the winners of…

21 mins ago

Opel Grandland: the new SUV debuts in Eisenach

The new Opel Grandland is born in the Eisenach plant, an electric SUV that combines…

38 mins ago

Is Rabbit R1 just an Android app? The AI ​​assistant installed on a smartphone

Rabbit R1 it caused quite a stir at CES 2024, where it quickly became one…

44 mins ago

Corsair RM850x white: high-performance and silent ATX power supply

Excellent performance and uncompromising reliability | Corsair RM850x white The RM850x White boasts the same…

1 hour ago