Survey: Malware Response teams fear 2012 threats will grow in number and sophistication
A survey by Norman ASA reveals more than half of IT leaders believe that malware threats are their biggest worry for 2012. They're also worried that the new malware is too sophisticated for their analysis and security capabilities.
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent cited the growing number of threats as their biggest worry for 2012.
These findings, a concern for manufacturing, automation, and control cyber security efforts, are part of a major survey of malware analysis trends completed by an independent research firm for Norman ASA.
"It is widely recognized that the volume and sophistication of threats continues to grow dramatically, yet many organizations are only incrementally adding resources to better understand these threats," said Darin Andersen, vice president and general manager, North America for Norman. "Analysis is a critical component of a comprehensive defense-in-depth strategy. Failure to maintain an updated understanding of these threats will leave networks increasingly vulnerable."
Nearly two-thirds (65 percent) predict the sheer number of malware threats will grow by more than 25 percent this year. However, these IT leaders also report their organizations are not making the investments required to keep up. Just 17 percent state that today they are catching all the malware targeted at their company. Even more alarming, just under half (45 percent) predict their malware budgets will go up in 2012 and only one-third (33 percent) state they will add analysts to their response teams this year.
Organizations that do plan to beef up their security capabilities will have a difficult time this year. Just under half believe it will be harder this year than in the past to find malware analysts and a similar number state they will have less time to train analysts this year than in the past.
As a result of these difficulties, 52 percent plan to augment their internally-developed solution with a commercial solution in 2012. Nearly three-quarters (71 percent) will make this move in part because in-house solutions require significant management attention and maintenance.
Analysts Turn to Commercial Anti-Malware Solutions to Support In-house Solutions and Cite Cost Effectiveness
More than half of survey respondents (54 percent) use both internally-developed and commercially-available anti-malware analysis solutions. IT leaders who use commercial solutions outnumber those who have internally-developed solutions by more than 4-to-1 (37 percent versus 9 percent).
Forty percent of IT leaders who purchased a commercially-available malware analysis solution acquired it to support their internally-developed capabilities, while more than one-third (35 percent) listed cost effectiveness as the reason for purchase and another 35 percent turned to a commercial solution to address the number of files their team must analyze.
"IT leaders are falling behind and are turning increasingly to automated commercial solutions to close the gap," Andersen said. "Fewer than half of surveyed companies will have bigger malware analysis budgets this year, and even among many of those, their teams will have limited time to train the new personnel."
"Because it will be difficult for analysis teams to handle the sheer volume of threats, the automated solutions IT teams purchase must feature scalability. The ability to simply add effective new appliances to a network as the number of threats increase will significantly help teams keep up with the growing threat of cyberattacks."
- Edited by Chris Vavra, Control Engineering, www.controleng.com
See the safety and security channel at
|Search the online Automation Integrator Guide|
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.