VMware Explore Is on the Horizon
VMware Explore Is on the Horizon

Set your sights higher. 4 days. Hundreds of sessions. Endless ideas.

News Releases4 min read

VMware Releases Cybersecurity Threat Survey Report Detailing Increased Attack Volume and Breach Levels in Australia

Global COVID-19 surge adding new elements to threat environment

VMware, Inc. (NYSE: VMW), a leading innovator in enterprise software, today released the results of its third Australia-focused cybersecurity threat report entitled, “Extended Enterprise Under Threat,” based on a survey of 250 Australian CIOs, CTOs and CISOs.

The research found an increase in both cyberattack volume and breaches during the past 12 months in Australia. This has prompted increased investment in cyber defense, with Australian businesses using an average of more than eight different cybersecurity tools, the survey found.

Data for the report was compiled in March and April 2020 by an independent research company, Opinion Matters, on behalf of VMware Carbon Black.

Key survey findings from Australian respondents:

  • 94% said attack volume has increased in the last 12 months, the survey found.
  • 96% said their business has suffered a security breach in the last 12 months. The average organization said they experienced 2 breaches during that time, the survey found.
  • 88% said attacks have become more sophisticated, the survey found.
  • 96% said they plan to increase cyber defense spending in the coming year according to the survey.
  • OS vulnerabilities and third-party application attacks were the leading cause of breaches, according to the survey, both with 18% respectively, followed by web application attacks.
  • Australian companies said they are using an average of 7 different security technologies to manage their security program, the survey found.

Third-party risk in Australia

Despite only being cited by 4% of respondents as the most common attack type experienced, island-hopping was the cause of 11% of breaches, the survey found, as the attack vectors in the supply chain prove an easy target for hackers.  Third-Party application and web application breaches were also high with 18% and 13% respectively.

Rick McElroy, Cyber Security Strategist at VMware Carbon Black, said: “Island-hopping is having an increasing breach impact with 11% of our survey respondents citing it as a main cause of breaches. In combination with other third-party risks such as third-party apps and the supply chain, it’s clear the extended enterprise is under pressure.”

Complex multi-technology environments

Australian cybersecurity professionals said they are using an average of more than seven different tools or consoles to manage their cyber defense program, the survey found. This indicates a security environment that has evolved reactively as security tools have been adopted to tackle emerging threats.

Said McElroy: “Siloed, hard-to-manage environments hand the advantage to attackers from the start. Evidence shows that attackers have the upper hand when security is not an intrinsic feature of the environment. As the cyber threat landscape reaches saturation, it is time for rationalization, strategic thinking and clarity over security deployment.”

Supplemental COVID-19 survey

The latest research was supplemented with a survey on the impact COVID-19 has had on the attack landscape1. According to the supplemental survey of more than 1,000 respondents from the US, UK, Singapore and Italy, 91% of cybersecurity professionals said attack volumes have increased as more employees work from home. 92% said their organizations have experienced cyberattacks linked to COVID-19 malware.

Key findings from the supplemental COVID-19-focused survey:

  • 92% said they have been targeted by COVID-19-related malware; 89% said IoT exposure risk has increased.
  • Inability to institute multifactor authentication (MFA) was reported as the biggest security threat to businesses during COVID-19, the survey found.
  • 84% reported gaps in disaster planning around communications with external parties including customers, prospects, and partners. 48% said those gaps were significant.

Said McElroy: “The global situation with COVID-19 has put the spotlight on business resilience and disaster recovery planning. Those organizations that have delayed implementing multi-factor authentication appear to be facing challenges, as 29% of global respondents say the inability to implement MFA is the biggest threat to business resilience they are facing right now.”

Survey respondents were asked whether COVID-19 had exposed gaps in their disaster recovery plans, and to indicate the severity of those gaps. Their responses showed that:

  • 88% of respondents reported gaps in recovery planning, ranging from slight to severe.
  • 87% said they had uncovered gaps in IT operations.
  • 85% said they encountered problems around enabling a remote workforce.
  • 78% said they’ve experienced challenges communicating with employees
  • 84% said they had experienced difficulty communicating with external parties.
  • 70% said the situation uncovered gaps around visibility into cybersecurity threats.

Said McElroy: “These figures indicate that the surveyed CISOs may be facing difficulty in a number of areas when answering the demands placed on them by the COVID-19 situation.”

Risks directly related to COVID-19 have also quickly emerged, the survey found. In addition to the 92% of respondents who said they experienced an increase in COVID-19-related malware, 89% reported increased IoT exposure, 89% said they had witnessed increased phishing attacks, and 88% had seen more attempts at spear phishing since COVID-19 began.

Said McElroy: “The 2020 survey results suggest that security teams must be working in tandem with business leaders to shift the balance of power from attackers to defenders. We must also collaborate with IT teams and work to remove the complexity that’s weighing down the current model. By building security intrinsically into the fabric of the enterprise – across applications, clouds and devices – teams can significantly reduce the attack surface, gain greater visibility into threats, and understand where security vulnerabilities exist.”

Read the full executive summary here

About VMware’s Intrinsic Security Strategy

Security sprawl – too many products, agents, and interfaces deployed across an organization – has created complexity for security management, opening organizations to significant risk. Most security innovation over the past decade has focused on identifying and reacting to individual attacks. Little innovation has focused on hardening infrastructure itself to make it more secure or using the infrastructure to better protect an organization.