By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Survey: one in five enterprises have experienced espionage attacks
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Survey: one in five enterprises have experienced espionage attacks
Enterprise

Survey: one in five enterprises have experienced espionage attacks

Raymond Lau
Last updated: April 12, 2013 at 9:23 AM
Raymond Lau
Published: April 12, 2013
2 Min Read
SHARE

ISACA

 

More than one in five enterprises have experienced Internet-based espionage called advanced persistent threat (APT) attacks, according to a global cybersecurity survey conducted by the Information Systems Audit and Control Association (ISACA) this week.

APT attacks, as their name suggests, are advanced and persistent attacks against enterprises, usually with the goals of  intellectual property theft and the unauthorised access of sensitive information.

Because APT attacks use a variety of sophisticated and well-orchestrated techniques, they are commonly the work of organised groups, such as a foreign government, instead of “script kiddies”.

These attacks have made headlines in recent times, such as the “Aurora” attacks against Google in 2010.

According to ISACA’s survey, 60 per cent of the 1,500 respondents believe that it is only a matter of time before their enterprise is targeted by APTs.

Yet, 53 per cent do not believe that APT attacks differ from traditional threats, thinking that they can be dealt with through the same traditional measures such as anti-malware software and firewalls.

This is a concer, as APT attacks have been known to avoid these types of controls, according to ISACA, a non-profit association for IT security and governance.

“APTs are sophisticated, stealthy and unrelenting,” said Christos Dimitriadis, international vice president of ISACA, in a statement on Tuesday. “An APT will continually attempt to penetrate the desired target until it meets its objective — and once it does, it can disguise itself and morph when needed, making it difficult to identify or stop.”

The situation is further complicated by the BYOD (bring-your-own-device) trend, which could potentially bring hundreds of unsecured devices into enterprise environments and provide points of attack.

“APTs call for many defensive approaches, from awareness training and amending third-party agreements to ensure vendors are well-protected, to implementing technical controls,” said Jo Stewart-Rattray, director of ISACA.

The survey was sponsored by Trend Micro, and the full report can be downloaded here.

Lotus Singapore 2009 talks up collaboration
SingHealth tests out NEC face recognition technology for visits to hospitals
At Singapore innovation centre, NEC’s face recognition tech can detect you wearing a Mission Impossible mask
Businesses use the cloud to manage risk but are they also concentrating it?
Going on the cloud? Think SD-WAN
TAGGED:advanced persistent threatAPTcybersecurityInformation Systems Audit and Control AssociationISACA

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Hands on: Samsung Galaxy S4 is not as “plasticky” as thought
Next Article Does sharpest fall in PC shipments signal the start of the end?
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?