The number of cyberattacks is increasing day by day. Many employees in the IT department of large companies reveal that their leaders impose silence on them in the event of a leak or hack. Neither the general public nor the authorities need to know.
A survey conducted by BitDefender, a company specializing in anti-malware tools, among 400 IT professionals working for large groups tells us that 30% of them have hidden the fact that their box has been the victim of data leaks or cyberattacks. More often than not, this silence was not of their own initiative: it was their superiors who gave them the order.
A culpable silence, because, beyond being illegal, the fact of not disclosing this kind of incident puts the company even more at risk and other internet users. That said, not all the IT professionals interviewed complied with the instructions of their leaders. 12% of IT disclosed the data breach despite management orders.
Many companies hide the fact of having been victims of a cyberattack
Being the victim of a cyberattack is never pleasant, nor very good for the image of the companies affected. In addition, the following surveys these intrusions can lead to fines and legal proceedings, because they often reveal shortcomings of the company in terms of data security, the use of pirated software in an SME, for example. It is however necessary that companies and cyber defenders share the information at their disposal as quickly as possible. There is urgency, because in this ever more connected world, hackers and opportunities to defraud Internet users are ever more numerous.
To read – Microsoft puts its AI at the service of the fight against cybercrime with Security Copilot
It is an established fact, cyberattacks are multiplying and gaining in intensity. Also according to the BitDefender study, 52% of organizations have suffered a data leak in the last twelve months. The most frequent incidents relate to software and zero-day vulnerabilities, phishing and social engineering scams, “Supply chain attacks”, which target a company’s subcontractors, ransomware, and threats from within.
Source : VentureBeat