Prevention, Detection, and Recovery from Cyberattacks- Part I

Summarise on:
Charu Pel

Charu Pel

6 min Read

Prevention, Detection, and Recovery from Cyberattacks- Part I

During the team discussion about next-gen tools and techniques for prevention, detection, and recovery from cyberattacks, we started looking at some of the common mistakes that could have prevented cyberattacks.

Careful investigation shows that cyberattacks can be very damaging, and human error is a major factor. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of breaches are caused by human error. Since 2010, breaches due to human error have increased, breaches due to malware have decreased, and insider abuse has dropped drastically.

An IBM study published in July 2019 found that inadvertent breaches from human error and system glitches were still the cause for nearly half (49%) of the data breaches in the report, costing companies $3.50 million and $3.24 million, respectively. Human error caused 90% of cyber data breaches in 2019, according to a CybSafe analysis of data from the UK Information Commissioner's Office (ICO).

In the near past, network security focused on big corporations and institutions. Nowadays, every person might be a potential victim of cyberattacks. So we decided to list some myths and realities about cyberattacks.

What are common myths and realities about cyberattacks?

MythReality
Only certain industries are vulnerable to cyber attacksAny organization with sensitive information is vulnerable to attack
An infected computer displays a message intended to scare the user or operates very slowlyHackers want to control the system or steal information, and they are not interested in displaying a skull on the screen
The company has a firewall hence the company is in good shapeA well-configured firewall can protect the company, but most of the time insider attack is often the biggest vulnerability
The corporate systems are disconnected from the internet, so the company will not have any risksInternal threats pose a large threat. USB drives, laptops, etc. that are brought into the isolated network can introduce huge risks
Small and medium-sized organizations are not targeted by hackersAlmost third or 28% of data breaches in 2020 involved small businesses as per Verizon Business 2020 Data Breach Investigations Report (2020 DBIR)
Anti-virus and anti-malware software keep the organization completely safe<a href='/blog/cybersecurity/malware-ransomware-how-do-i-get-infected-by-malware' style='color:#4b7b2c; text-decoration:underline'>The malware</a> or virus protection software cannot protect against all cyber risks especially there could be zero-day attacks
The company virus detection software is up to date, so it is safeVirus detection software detects known virus signatures. New and mutating viruses can evade signatures
The user will know right away if your computer is infectedModern malware is stealthy and remains undetected for a longer time
Cybersecurity threats come from the outsideInsider threats are just as likely, and harder to detect
A VPN makes the organization completely anonymousEven though VPN data tunnel is encrypted, attacks come in many forms and organizations are not immune to other types of security compromises
If Wi-Fi has a password, then it is secureAll public Wi-Fi can be compromised, even with a password
Complete cybersecurity can be achievedCyber preparedness is ongoing, with a new threat emerging every day
A strong password is enough to keep the business safeTwo-factor authentication and data monitoring are required to protect the organization from emerging threats
Attackers rush to get in and leave quicklyAttackers deploy 'low and slow' techniques
Governments’ new stricter cybersecurity laws and policies are discouraging cybercriminalsAccording to Interpol, cybercriminals are developing and boosting their attacks at an alarming pace, exploiting fear and uncertainty
Effective response equals fast response hence low impactAttackers perform several decoy operations to distract response teams
Cybersecurity specialists can effectively manage growing threats due to advanced technologiesMost small to mid-size enterprises have limited cybersecurity investments due to financial constraints
Government and agencies can efficiently deal with ransomwareMany real cases show high ransom payments, such as $600,000 by Riviera Beach and $400,000 by Jackson County
Cyber liability insurance fully protects organizations financiallyCompanies often struggle to prove damages and may not receive full reimbursement

The list of myths and realities is compiled using several data sources, including WaTech's state Office of Cybersecurity (OCS), Verizon DBIR, IBM study reports, and CybSafe-related risk themes.

GRC Insights That Matter

Exclusive updates on governance, risk, compliance, privacy, and audits — straight from industry experts.

Related Resources

Related Posts

Prevention, Detection, and Recovery from Cyberattacks - Part II
Cybersecurity
Prevention, Detection, and Recovery from Cyberattacks - Part II

Review incident response readiness with a practical checklist covering six IR phases, audit questions, and standards mapping for prevention, detection, and recovery.

Read More
Prevention, Detection, and Recovery from Cyberattacks Part III
Cybersecurity
Prevention, Detection, and Recovery from Cyberattacks Part III

Explore Zero Trust as a practical security model, including the supporting technologies and adoption considerations for organizations.

Read More
Prevention, Detection and Recovery from Cyberattacks
Cybersecurity
Prevention, Detection and Recovery from Cyberattacks

Strengthen cyber resilience by understanding threat actors, attacker paths, and high-impact security basics for prevention, detection, and recovery.

Read More
background-line