Have an account?
  •   Personalized content
  •   Your products and support
Log In

Need an account?

Create an account

2018 Annual Cybersecurity Report

Discover security insights, key findings and the latest threat intelligence

Download report

Get this year's report

acr-2018-report-preview-800x450

What we cover in this report

Evolution of Malware

Malware is becoming more vicious. And it’s harder to combat. We now face everything from network-based ransomware worms to devastating wiper malware. At the same time, adversaries are getting more adept at creating malware that can evade traditional sandboxing.

Malicious Encrypted Web Traffic

50 percent of global web traffic was encrypted as of October 2017. Encryption is meant to enhance security. But it also provides malicious actors with a powerful tool to conceal command-and-control activity. Those actors then have more time to inflict damage.

Rise of Artificial Intelligence (AI)

Encryption also reduces visibility. More enterprises are therefore turning to machine learning and artificial intelligence. With these capabilities, they can spot unusual patterns in large volumes of encrypted web traffic. Security teams can then investigate further.

Major findings

“Burst attacks” grow in complexity, frequency, and duration.

In one study, 42 percent of the organizations experienced this type of DDoS attack in 2017. In most cases, the recurring bursts lasted only a few minutes.

Many new domains tied to spam campaigns:

Most of the malicious domains we analyzed, about 60 percent, were associated with spam campaigns.

Security is seen as a key benefit of hosting networks in the cloud.

The use of on-premises and public cloud infrastructure is growing. Security is the most common benefit of hosting networks in the cloud, the security personnel respondents say.

Insider threats: A few rogue users can have a big impact.

Just 0.5 percent of users were flagged for suspicious downloads. On average, those suspicious users were each responsible for 5200 document downloads.

More OT and IoT attacks are on the horizon.

Thirty-one percent of security professionals said their organizations have already experienced cyber attacks on OT infrastructure.

The multivendor environment affects risk.

Nearly half of the security risk that organizations face stems from having multiple security vendors and products.

New Challenges

Stop threats at the edge

Stop threats at the edge

Digital businesses can stay focused with a next-generation firewall (NGFW) with Cisco Advanced Malware Protection. Adding Cisco Email Security makes network protection even more effective.

Protect users where they are

Protect users where they are

Only 75 percent of workers stay on a corporate network. Protect them everywhere they go with Cisco AMP for Endpoints and Cisco Umbrella working in harmony.

Stop threats faster

Stop threats faster

The network is the most powerful foundation for an organization’s security. Cisco Stealthwatch Enterprise and Cisco ISE work together with the network to provide powerful, highly secure access; automated threat detection; and software-defined segmentation. They can even detect encrypted threats.

Cisco Umbrella

Cisco Umbrella

Protect against threats when users are off the VPN—without needing to deploy another agent.

Network visibility and security analytics

Network visibility and security analytics

Cisco Stealthwatch uses NetFlow to provide visibility across the network, data center, branch offices, and cloud. Its advanced security analytics uncover stealthy attacks on the extended network.

Cisco Secure Data Center

Cisco Secure Data Center

Modern data centers need a new security approach.

Success stories

Learn how Cisco security is helping these companies better protect their customers, employees, and brands.

Meet the experts

talos-600x338

Cisco Talos

Follow our industry-leading team of security intelligence and research experts who regularly share analyses of threats and provide you with tools to help protect you against them.

Archive