October 2017

Global DDoS Attacks & Cyber Security Insights Report

Persistent Threat, More Impact
A Neustar Security Solutions Exclusive
One and Done

92%

All You Need is One

92% of companies attacked just once reported a form of theft.

 
More Successful Breaches

2.2

Breaches Are Up

Despite a small increase in attacks, the average number of breaches per incident rose to 2.2.

 
Déjà vu, all over again

76%

Repeat Defenders

76% of organizations reported multiple assaults, while those attacked once rose to 92%.

Shifting Defensive Strategies

In our April 2017 report, we highlighted companies’ determination to increase their investments toward multi-layered defensive strategies and away from traditional defenses. This trend resulted in the rapid adoption of web application firewalls (WAF), which can shore up deficiencies in Layer 7 - an often exploited layer in the network stack.

Slower Detection Times

Despite diversifying their defensive strategies, companies are still expressing frustration with their inability to detect incoming DDoS attacks. According to the results, 70% of organizations that needed at least three hours to detect incoming DDoS attacks reported some form of theft in conjunction with the assault.

How Long It Took to Detect DDoS Attack

What’s at Risk

For companies that require 1 hour or more to detect a DDoS attack – and that’s nearly 1/3 of respondents – the loss of revenue is a staggering $250k per hour. Lagging detection times continue to plague companies, and those that need at least three hours to detect an attack find themselves facing serious revenue loss and brand damage.

 

Average Peak Hourly Revenue Loss

Threat ABCs: Attack, Breach, Confusion

Cybercriminals have found a number of ways to employ DDoS attacks. While some attacks are merely annoying disruptions or acts of vandalism, most often they are calculated, and frequently serve as smokescreens to mask the attacker’s sinister motives.

Result of Data Breach or Theft Suffered As a Result of DDoS Attack

Attackers are enjoying a higher yield while launching fewer attacks. As criminals continue to refine their tactics and become increasingly focused and more efficient, the use of DDoS attacks as a means to steal information, breach infrastructures, or cause company disruptions remains a high, serious threat.

Preparation Pays

As criminals continue to refine their tactics and become increasingly focused and more efficient, the use of DDoS attacks as a means to steal information, breach infrastructures, or cause company disruptions remains a high, serious threat. It’s important for organizations of all sizes to stay abreast of the evolving threat landscape and take the necessary steps to strengthen defenses.

For an in-depth look at the DDoS threat landscape and how organizations like yours are adjusting their defensive strategies, get the latest Neustar Global DDoS Attacks & Cyber Security Insights Report.