Don’t let high-profile security attacks dominate your security efforts

By Craig Lawson, Gartner, Inc.

With cyber attacks such as WannaCry and Petya wreaking havoc around the world, as well as high-profile data breaches like Equifax. It’s easy to get caught up in the news cycle, but they’re not the main threats security professionals should be focusing their attention on.

Vulnerabilities, and the exploitation of them, are still the root cause of most information security breaches today. Although not all breaches result from a vulnerability being exploited, most do. Within this majority, they also come from known vulnerabilities, rather than zero-day attacks.

Zero-day vulnerabilities made up only approximately 0.4 per cent of vulnerabilities during the past decade. The amount spent on trying to detect them is out of kilter with the actual risks they pose. This is compared with the massive numbers of breaches and infections that come from a small number of known vulnerabilities that are being repeatedly exploited.

Are zero-day attacks real? Absolutely. Are they the biggest issue for most organizations? No. The top issue in vulnerability management is that organizations aren’t prioritizing their patching and compensating controls to align to vulnerabilities targeted by threat actors.

Organizations need to align their vulnerability management priorities with the biggest security threats. Although Gartner is seeing persistent and advanced threats, most threat actors don’t use overly sophisticated means to achieve their goals in most cases. Instead, they are leveraging known vulnerabilities more often than not to get the job done.

Deal with the elephant in the room first

Gartner believes that 99 per cent of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident.

If you deal with the biggest cause of breaches and data loss first, then you’ll have a better foundation to work on more difficult issues. Don’t stop continually inching toward improvements with a vulnerability management program, but it’s more critical to reduce attack surfaces by closing the biggest risks, which are the known vulnerabilities being exploited in the wild.

The number of exploited vulnerabilities year over year for the last decade is actually flat, despite the number of breaches increasing and the number of threats appearing. Essentially, more security threats are leveraging the same small set of vulnerabilities.

Focus on vulnerabilities exploited in the wild

As a top priority, focus your efforts on patching the vulnerabilities that are being exploited in the wild or have competent compensating control(s) that can. This is an effective approach to risk mitigation and prevention, yet very few organization do this.

This prioritization reduces the number of vulnerabilities to deal with. This means you can put more effort into dealing with a smaller number of vulnerabilities for the greater benefit of your organization’s security posture.

Craig Lawson is a research vice president with Gartner, focusing on network security, firewalls, web application firewalls (WAF), IPS, IDS, SIEM, log management, vulnerability management, advanced persistent threats (APT), vulnerability research, threat intelligence, managed security service providers (MSSP), cloud access security brokers (CASB) and cloud security.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada
Gartner
Gartnerhttp://www.gartner.com
Gartner, Inc. (NYSE: IT) delivers actionable, objective insight to executives and their teams. Our expert guidance and tools enable faster, smarter decisions and stronger performance on an organization’s mission critical priorities. To learn more, visit gartner.com.

Featured Download

IT World Canada in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Latest Blogs

Senior Contributor Spotlight