ENISA Threat Landscape of 2015 Underlines Need for Context

By: Arieanna Schweber | 3/1/2016

The European Union Agency for Network and Information Security (ENISA) recently released the ENISA Threat Landscape 2015, a report which identifies the top 15 cyber threats experienced in the 2015 calendar year. In this fourth annual report, malware was identified as the top cyber threat, followed by web-based attacks and web application attacks, consistent with the trends of the previous year.

The top 15 threats identified by ENISA were: Malware, Wed-based attacks, Web application attacks, Botnets, Denial of Service, Physical damage, theft or loss, Threats from insiders, Phishing, Spam, Exploit Kits, Data Breaches, Identity Theft, Information Leakage, Ransomware, and Cyber espionage.

Although we see a lot of cyber-related threats in this list, it should be noted that physical damage, theft or loss also climbed up on the list. Both findings are consistent with the growth of mobile and the cloud, together increasing the available attack surface for cyber attack. It’s now recognized that people are the root cause of most data breaches, as many as 90% of all breaches, and that many risks originate on the endpoint.

The ENISA report has created a series of messages in order to understand the context of cyber threats and lessons to be learned from breaches in 2015. The idea of context is important, as even at an organizational level, the sheer volume of threat alerts can lack the appropriate context to allow IT to take pre-emptive action and/or set better security measures.

Technology such as Absolute DDS can alert your IT team to irregularities in software, hardware or user behaviour much earlier in the chain of events. Encryption disabled? Receive an alert. Device in unusual location? Receive an alert. With customized alert options, and automated protections (such as device freeze), IT has more tools to detect security incidents before they progress. Using historical data, IT can see clearly if an alert is relevant, providing the context needed to take pre-emptive action (such as remotely deleting or recovering data) to prevent a data breach or at least to respond to it quickly. Learn more about how our team can assist you with your risk response and endpoint security here.

Financial Services