With security threats constantly evolving, businesses need do a better job planning for and reacting to breaches, according to a cyber security report released today by AT&T.
For businesses, cyber security attacks are almost inevitable, according to AT&T's latest report, "The CEO's Guide to Cyberbreach Response," which can be accessed here. Last year, 62% of organizations reported security breaches, with 42% of those organizations saying those attacks had a negative impact on their businesses.
Yet 66% of organizations had no effective incident response plan in place, according to Jason Porter, security solutions VP for AT&T Inc. (NYSE: T). He explains the issue in this blog.
In his blog, Porter wrote that businesses need to be aware that every person who has access to a network could cause a security breach, and they should plan accordingly.
"Every single day we see around 30 billion malicious scans -- where attackers are probing for vulnerabilities -- and 400 million spam messages on our global IP network," Porter wrote. "In fact, we block 5 billion malicious scans and 200,000 malware events that are targeted specifically to us every day."
Over the past year, security breaches caused major enterprises an average of 23 hours of down time while midsized businesses experienced an average of 14 hours of downtime. Even one or two hours of operational downtime can lead to losses totaling in the millions for some companies.
AT&T's report arms CEOs with the details on what they need to do before, during and after their companies are exposed to a cyberattack.
In this Telco Transformation radio show, Delphine Woussen, Head of Smart Territories at Orange Business Services, will examine the opportunities and challenges that service providers face in supporting the applications that underpin the growth of smart buildings and smart city infrastructure.
In this Telco Transformation radio show, AT&T's Mazin Gilbert and the Linux Foundation's Arpit Joshipura will discuss some of the key concepts of ONAP, including the recent formation of its technical steering committee as well as opening up the code and documentation to the industry.
The promise of 5G connectivity is a truly Networked Society. 5G is not just about making the throughput larger, it is also about offering use case optimized user experiences and inclusion of new vertical sectors. Use cases predicted for 2020 will need new types of connectivity services that are highly scalable and programmable in terms of speed, capacity, security, reliability, availability, latency and impact on battery type. 5G will need to be an agile, dynamically programmable network that can meet diverse needs with new, as-a-service models on a single infrastructure. In this Webinar, you will learn how the Open Networking Foundation is combining open source and software defined standards through its Open innovation Pipeline to advance innovative architectures such as mobile CORD (M-CORD). M-CORD is being developed by the CORD Project community under ONF's leadership and hosted by The Linux Foundation. Built on the pillars of SDN, NFV and cloud technologies, the end-to-end M-CORD open reference solution is arming operators with the capabilities needed to start planning for the upcoming 5G transition.