Even when warned, businesses ignore critical vulnerabilities and hope for the best
A Bulletproof research found the extent to which businesses are leaving themselves open to cyber attack. When tested, 28% of businesses had critical vulnerabilities – vulnerabilities that could be immediately exploited by cyber attacks.
A quarter of businesses neglected to fix those critical vulnerabilities, even though penetration testing had highlighted them to the business after a retest was completed.
The research analyzed data from over 3,800 days’ worth of penetration testing services. These tests are a means of identifying vulnerabilities within an organization’s security systems by simulating how malicious actors would seek to exploit such shortcomings.
The top three critical issues for businesses
- Outdated & vulnerable components (37%)
- Broken access control (11%)
- SQL injection (7%)
With the government’s renewed ambition to tackle cyber resilience across the supply chain and MSPs facing fines in the millions if they cannot adhere to new regulations, the need for a more comprehensive approach towards cyber security is a high priority. Many vulnerabilities that are not addressed within the first year are never remediated, and more stringent regulation means businesses must begin to address these historic vulnerabilities if they are to avoid sanction and remain secure.
Oliver Pinson-Roxburgh, CEO at Bulletproof, said: “Our research found that even when alerted to critical vulnerabilities which could be exploited by attackers, a quarter of businesses chose to leave them and hope for the best. In reality this proportion is likely to be much higher, considering that our research was only from companies who actually had a retest. This complacency has contributed to the huge growth industry that is cybercrime today.
“Most businesses we work with do tackle the highest priority threats, but they are faced with limited time and resources. The problem we see is that almost every business is expanding its digital capabilities now, and this has led to an explosion of critical vulnerabilities as the attack surface grows. Most security teams I speak to are struggling to keep on top of even high-priority patches.
“The solution is a defence in depth approach, layering multiple cyber resilience tools and tactics to thwart potential attackers and protect critical business functions. With the looming threat of new regulation for non-compliant MSPs on the horizon, it will be interesting to see how far security teams can go in addressing these vulnerabilities over the next 12 months.”