Corporate security teams are not patching holes in their software or security tools, according to a Cisco survey released this week. Less than 50% of the respondents at 1,700 companies in nine countries use standard tools such as patching and configuration to help prevent security breaches and ensure that they are running the latest versions of software.
Indeed, even though Heartbleed was the landmark vulnerability last year, 56% of all installed OpenSSL versions are over four years old. And chief information security officers may not even know that – 75% believe their security tools as very or extremely effective.
The survey also found that end-users are unknowingly aiding cyber-attacks. Throughout 2014, Cisco said its threat intelligence research revealed that attackers have increasingly shifted their focus from seeking to compromise servers and operating systems to exploiting users at the browser and email levels.
In addition to shifting attack focus, hackers are adopting techniques that make attacks harder to detect and analyze. Such techniques include snowshoe spam, lesser known web exploits, and combining exploits over two different files.
Sharing exploits over two different files can make it more difficult for security devices to identify and block the exploit and to analyze it with reverse engineering tools, Cisco says.
The craftiness of the attack and the constant wariness of CISOs is further complicated by the geopolitical motivations of the attackers, and the conflicting requirements imposed by local laws with respect to data sovereignty, data localization and encryption, the Cisco study finds.
A copy of the Cisco Annual Security Research report can be found here.
More from Cisco Subnet: