Access and Feeds

Security: If Businesses Could Better Share Threat Intelligence, They Could Reduce Risk of Data Breaches

By Dick Weisinger

The needle is moving in the wrong direction when it comes to the frequency of data breaches which hit companies.  In 2014, Ponemon reports that 43 percent of businesses had suffered at least one significant data breach over the previous twelve months.  Now, in 2015, the number has reached 47 percent of businesses.

The Ponemon report suggests that one way to shrink the number of breach incidents is for businesses to be more open and to share their threat intelligence with other businesses.  While many businesses are actually already participating in some level of data sharing, the information that’s shared is often old or is often too raw in format.  65 percent of businesses said that they thought if they had access to threat intelligence information that was clearly presented and refined that they likely would have been able to prevent cyber attacks.

Larry Ponemon, Chairman and Founder of the Ponemon Institute, said that “it is becoming more and more apparent that raw threat data is not effective. Just like the bad guys share ways to carry out their attacks, organizations must also share actionable and timely ways to stop threats.  It is also clear that it is impossible for one organization to harvest that threat intelligence on their own as evidenced by the fact that 83 percent of people we surveyed exchange threat intelligence.”

The Ponemon report suggests part of the reason intelligence isn’t widely shared today is a lack of trust on the data being shared, a lack of resources to distribute and to then act on the information, and the fact that most sharing processes have been very slow.  Further, Mark Foege, vice president of IID, told eWEEK that “I don’t think that those organizations will suddenly change.  There are many reasons that cut across industries and companies as to why they don’t share.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on DotNetKicks.com
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)

Leave a Reply

Your email address will not be published. Required fields are marked *

*