Symantec’ 2015 Internet Security Threat Report: Attackers are bigger, bolder, and faster

ISTR20_Key_Findings_600_FINAL.pngVolume 20 of Symantec’s Internet Security Threat Report (ISTR) reveals that cyberattackers are infiltrating networks by hijacking company’s infrastructures, while also extorting end-users through their smartphones and social media.

Here are some of the recommendations

Take back control of your data
It may seem like attackers are overwhelming us at every angle, but as they persist and evolve, so do we. There are many simple steps you can take right now to get ahead—and stay ahead—of attackers.

For businesses:

  • Don’t get caught flat-footed: Use advanced threat intelligence solutions to help you find indicators of compromise and respond to incidents more quickly.
  • Employ a strong security posture: Implement multi-layered endpoint security, network security, encryption, and strong authentication and reputation-based technologies. Partner with a managed security service provider to extend your IT team.
  • Prepare for the worst: Incident management ensures your security framework is optimized, measureable, and repeatable, and that lessons learned improve your security posture. Consider adding a retainer with a third-party expert to help manage crises.
  • Provide ongoing education and training: Establish guidelines and company policies and procedures for protecting sensitive data on personal and corporate devices. Regularly assess internal investigation teams and run practice drills to ensure you have the skills necessary to effectively combat cyber threats.

For consumers:

  • Use strong passwords: This cannot be emphasized enough. Use strong and unique passwords for your accounts and devices, and update them on a regular basis—ideally every three months. Never use the same password for multiple accounts.
  • Be cautious on social media: Don’t click links in unsolicited email or social media messages, particularly from unknown sources. Scammers know people are more likely to click on links from their friends, so they compromise accounts to send malicious links to the account owner’s contacts.
  • Know what you’re sharing: When installing a network-connected device, such as a home router or thermostat, or downloading a new app, review the permissions to see what data you’re giving up. Disable remote access when not needed.

For more information on the ISTR and to read the full report, please visit

You can leave a response, or trackback from your own site.

Leave a Reply

You must be logged in to post a comment.