News Feed Item

BAE Systems Applied Intelligence Reveals That 60% of US Businesses Have Increased Cyber Security Spend Following Recent Wave of Cyber Attacks on Target and Other Organizations

BAE Systems Applied Intelligence today quantifies the extent of the impact on US businesses of the wave of recent high-profile cyber attacks in December 2013 and January 2014. New research conducted this month reveals that the attacks on international businesses, including banks and retail giants such as Target, led to a significant 60% of US businesses surveyed increasing their cyber security budget. Of those businesses planning to increase their cyber security budget over the next 12 months, a resounding 78% cited the recent attacks as having a significant influence on their decision.

The international research also found that 53% of US companies surveyed now regard the threat from cyber attacks as one of their top three business risks, mirroring the recent warning from the World Economic Forum that cyber attacks are among the 5 biggest threats facing the world in 2014.1 The research details business concerns and opinion around cyber and indicates a strong demand from major global companies for greater intelligence about the nature of new cyber threats and a better understanding of business vulnerability.

The new findings come as BAE Systems Applied Intelligence releases “Business and the Cyber Threat: the rise of Digital Criminality”, which found that the majority of US respondents (82%) expected the number of targeted cyber attacks to increase over the next two years.2 It was immediately striking that organized groups of fraudsters were identified by the highest number of respondents in both the US (52%) and across the survey group as a whole (55%), as the group considered most likely to mount attacks. This would seem to point to a concern around the potential damage of cyber-enabled fraud attacks of precisely the nature experienced by Target and others.

The research also showed that businesses believe that their increasing exposure to cyber threats, caused by new ways of working, poses a risk as they adapt business practices to keep pace with the hyper-connected world. For example, 72% of North American respondents thought the cyber risk posed by mobile technologies was a significant risk but only 61% were confident they understood the risks.3

Faced with these challenges, it was alarming to note that a significant proportion of respondents - around a third (31% in the US and 30% globally) - still did not believe that their Board of Directors fully understood the risks presented by cyber. To investigate further, the research then explored which tools respondents believed would help their Boards to take greater action to prevent cyber attacks. Having a clearer understanding of vulnerabilities (advocated by 53% of respondents in the US and 50% overall) and having intelligence about upcoming threats (44% in the US and 47% overall) proved the most popular responses.

Martin Sutherland, Managing Director, BAE Systems Applied Intelligence, said:

“What this research clearly shows is that US businesses are increasingly aware of the cyber threat and have a range of counter measures in place. However, digital crime as a whole - a dangerous combination of organized groups of criminals using cyber techniques to carry out financial crime - is also a major concern, particularly since the most recent wave of high-profile attacks.

“And as the number of avenues open to criminals in a hyper-connected world increases, we are seeing a genuine hunger from businesses for a clearer understanding of their own vulnerabilities and up to the minute cyber threat intelligence.”

Further US findings:

  • Cost: 29% of respondents estimated a successful cyber attack would cost their organization more than US$75 million, a further 20% said more than US$15 million.
  • Cause of attacks: The group identified as most likely to mount target attacks by the highest number of US respondents was organized groups of fraudsters (55% of respondents). Americans were more concerned about those involved in industrial espionage than any other market (47% compared to 40% in Canada, 37% in the UK and 35% in Australia).
  • Concern: When asked what they would be most concerned about in the event of a successful attack, the most common response in the US was loss of customer data (61%). The second ranking concern amongst US respondents was theft of intellectual property – with Americans noticeably more concerned about IP theft than other markets (47% or respondents compared to 38% in Canada, 35% in the UK, and 43% in Australia).
  • Confidence: A substantial majority (88%) were confident in their organization’s ability to prevent targeted cyber attacks. A smaller, but still large majority (77%), were confident in their sector’s ability to prevent attacks.
  • Crisis Plans: 28% of US organizations surveyed still did not have, or were unaware of, crisis plans in the event of a cyber attack on their company. Of those respondents who did have crisis plans, 56% thought these were well publicized. In Canada 70% of those surveyed said they had crisis plans, but only 37% of those with plans said they were well publicized.
  • Convergence: Of those respondents who had encountered cyber-enabled fraud, 55% of US respondents and 50% of Canadian respondents expect cyber to play an increasing role in financial fraud.

Martin Sutherland, Managing Director, BAE Systems Applied Intelligence, continued:

“The recent attacks demonstrate that there is no ‘silver bullet’ and a combination of robust processes, and controls, user awareness and vigilant security operations all have to play a part in protecting the enterprise. However, these approaches are only as good as the information used to implement them.

“In order to adapt to the ever evolving threat landscape, companies will also need to develop holistic threat intelligence management programs supported by security platforms that not only provide the raw intelligence data but also the ability to process and analyze large amounts of complicated information as quickly and clearly as possible.”

BAE Systems Applied Intelligence continues to develop ground breaking analytics tools that enable businesses to make the best possible use of all the threat data and intelligence they receive in order to defend themselves and their customers from digital criminality and keep one step ahead of an increasingly sophisticated group of adversaries.

We will be at stand 2226 in the South Exhibition at RSA 2014, for those visiting the show this year.

The full report can be found at: http://www.baesystems.com/ai/cyberthreat

Notes to editors

  1. From Global Risks 2014, published by the World Economic Forum in January 2014.
  2. Our North American report, “Business and the Cyber Threat: the rise of Digital Criminality”, is based on 350 online interviews conducted by Ipsos MORI with strategic and IT decision makers in private sector companies in the US (300) and Canada (50), carried out online using a business panel in Fall 2013. Participants were drawn from companies with a turnover in excess of US$470 million (Canadian $522 million) from a range of business sectors including Financial Services (Banking and Insurance), Telecoms, Energy, Transportation, Technology, Engineering, Mining, Legal, Media and Pharmaceutical. Additional research conducted with 151 respondents in North America was conducted online in February 2014 among a comparable audience.
  3. This refers to respondents scoring 4 or 5 out of 5, where 5 means ‘Very significant’ or ‘Very confident’ and 1 means ‘Not at all significant’ or ‘Not confident at all’
  4. Please contact us for a copy of the full report, or visit http://www.baesystems.com/ai/cyberthreat

About BAE Systems Applied Intelligence

We deliver solutions which help our clients to protect and enhance their critical assets in the intelligence age. Our intelligent protection solutions combine large-scale data exploitation, ‘intelligence-grade’ security and complex services and solutions integration.

We operate in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation.

Leading enterprises and government departments use our solutions to protect and enhance their physical infrastructure, mission-critical systems, valuable intellectual property, corporate information, reputation and customer relationships, competitive advantage and financial success.

Applied Intelligence is part of BAE Systems, a global defense, aerospace and security company with approximately 90,000 employees worldwide. BAE Systems delivers a wide range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. For more information, please visit www.baesystems.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
By now most people have either created their configuration management solution or are just embarking on this journey. In his session at @DevOpsSummit at 19th Cloud Expo, Marco Ceppi, a DevOps Engineer working at Canonical, will discuss how to take configuration management to the next level with modelling and orchestration. He will also discuss how and why people are moving from a machine-centric view to a service/application-oriented view of deployments, and how you can leverage the knowledge a...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?