According to a recent report titled, “Worldwide DDoS Attacks and Cyber Insights” Research Report” (by Neustar), the volume and velocity of DDoS attacks while detection and response times are lagging. More than 1,000 survey respondents across vertical industries participated in the survey. Eight-four percent said their organization suffered a DDoS attack in the last year, up from 73% in 2016. Of those, 86% of those impacted experience more than one DDoS attack.
While attacks are rising, the length of time it takes to detect and response to them is also increasing. Organizations took longer to identify and respond to attacks. Half of those impacted at least three hours to detect and half need at least three hours to respond. This represents an average revenue loss of at least $250,000 per hour, according to 43% of respondents.
Along with investing in detection tools, organizations must take a hard look at their incident response program. Rsam has identified common challenges many organizations face when responding to security incidents. Traditional ways – largely manual and reactive – of managing incident response are no longer scalable. Many security teams hit a wall. There are steps you can take to reign in the chaos. A whitepaper published today by Rsam CISO Bryan Timmerman, “7 Ways to Improve Your Security Incident Response,” outlines some proactive measures.
This paper covers seven ways to get your security incident response program moving towards a sustainable solution, like:
- Integrating with SIEM tools
- Prioritization concepts
- Leveraging threat and vulnerability data
- Standardizing playbooks
- Automating responses
- Enabling collaboration
- Sharing real-time dashboards