ENISA Threat Landscape of 2015 Underlines Need for Context
ENISA Threat Landscape of 2015 Underlines Need for Context

The European Union Agency for Network and Information Security (ENISA) recently released the ENISA Threat Landscape 2015, a report which identifies the top 15 cyber threats experienced in the 2015 calendar year. In this fourth annual report, malware was identified as the top cyber threat, followed by web-based attacks and web application attacks, consistent with the trends of the previous year.

The top 15 threats identified by ENISA were: Malware, Wed-based attacks, Web application attacks, Botnets, Denial of Service, Physical damage, theft or loss, Threats from insiders, Phishing, Spam, Exploit Kits, Data Breaches, Identity Theft, Information Leakage, Ransomware, and Cyber espionage.

Although we see a lot of cyber-related threats in this list, it should be noted that physical damage, theft or loss also climbed up on the list. Both findings are consistent with the growth of mobile and the cloud, together increasing the available attack surface for cyber attack. It’s now recognized that people are the root cause of most data breaches, as many as 90% of all breaches, and that many risks originate on the endpoint.

The ENISA report has created a series of messages in order to understand the context of cyber threats and lessons to be learned from breaches in 2015. The idea of context is important, as even at an organizational level, the sheer volume of threat alerts can lack the appropriate context to allow IT to take pre-emptive action and/or set better security measures.

Technology such as Absolute DDS can alert your IT team to irregularities in software, hardware or user behaviour much earlier in the chain of events. Encryption disabled? Receive an alert. Device in unusual location? Receive an alert. With customized alert options, and automated protections (such as device freeze), IT has more tools to detect security incidents before they progress. Using historical data, IT can see clearly if an alert is relevant, providing the context needed to take pre-emptive action (such as remotely deleting or recovering data) to prevent a data breach or at least to respond to it quickly. Learn more about how our team can assist you with your risk response and endpoint security here.

ABOUT THE AUTHOR

Arieanna Schweber

Arieanna Schweber has been a part of the Absolute writing team since 2007. Arieanna was Canada’s first female professional blogger and has been professionally blogging since 2006 and has spoken at leading blogging conferences including BlogHer and Northern Voice. Arieanna has a joint degree in Business and Communications from Simon Fraser University and continues to build communities for Vancouver-based clients.