New Research on How Cyber Teams Address Security Concerns and Measure Success

October 18, 2019

Hikvision HikWire blog article cyber team success

Hikvision Outlines Examples of Phishing to Avoid Hacks, Security Breach


New research found that more than half of surveyed security leaders have concerns and “struggle to align security initiatives to business goals,” according to a new report covered in the Security magazine article, “How Cybersecurity Teams Measure Success and Secure Budgets.”

The report from IT security company Thycotic, “Cybersecurity Team’s Guide to Success: How to Measure Results, Secure Budget, and Avoid Stress,” outlines research results from more than 500 global IT decision makers.

From the report: “CISOs (chief information security officers) are in a difficult situation: they need to find a way to prove business value to the executive board and business peers or fail to get the much-needed funds that will ensure the organization will survive cyber-attacks. However, most (45 percent) of security budget and initiatives have no measurement on how they improve business and (30 percent) say it is not even a priority to align security spend to the business success.”

Survey findings also included:

  • The top three obstacles to achieving business goals were lack of skilled resources (35 percent), security breaches being out of control (34 percent) and limited security budgets (34 percent).
  • 89 percent of respondents had measurable performance goals over the next 12 months. Forty-nine percent measured the number of security breaches.
  • 45 percent stated they were unable to measure effectiveness of previous security initiatives.

A key takeaway from the study was that security teams need to correlate technology performance metrics with business success to overcome limited budgets. “Security teams have in the past been too disconnected from the business while focusing most of their attention on the immediate security threats. They have become simply reactive to all cyber threats and incidents while simultaneously attempting to demonstrate value by measuring technology success—a metric that mostly has no correlation to business success, and therefore fails to make a positive impression with the executive board or employees,” from the report.


Hikvision Outlines Examples of Phishing to Avoid Hacks, Security Breach
Hikvision’s cybersecurity director outlined examples of phishing to help avoid hacks and security breach in this blog.

Here’s an excerpt from that article:

“Phishing attacks have long been an effective way for attackers to trick people into divulging sensitive information or infecting a system with malware. Malware can give an attacker remote access to protected systems and networks, encrypt a user’s data and charge a ransom to decrypt the data, or use that system as part of an attack against other systems.

In March of 2017, Google stated that its machine learning models now can detect and stop spam and phishing with 99.9 percent accuracy. However, this is a cat and mouse game that has been played for years by the spammers/phishers on one side, and the spam filter developers on the other side. Once the defenses get better against the latest spam attack methods, the spammers change their tactics to bypass the filters.”

The blog article includes screen shots with examples of phishing attacks to help you identify them and avoid clicking malicious links.

For more cyber tips and insights from Hikvision, check out our cybersecurity blogs at this link.

IMPORTANT! This model requires non-standard firmware. Do Not Install standard firmware (e.g. v.4.1.xx) on this model. Doing so will permanently damage your system. You must use custom firmware v.4.1.25 from the iDS-9632NXI-I8/16S product page.

By downloading and using software and other materials available via this website, you agree to be legally bound by HIKVISION General Terms of Use . If you don’t agree to these terms, you may not download or use any of those materials.

If you are agreeing on behalf of your company, you represent and warrant that you have legal authority to bind your company to the General Terms of Use above. Also you represent and warrant that you are of the legal age of majority in the jurisdiction in which you reside (at least 18 years of age in many countries).