Survey: Security Incidents like WannaCry Happen Multiple Times a Year

July 5, 2017
Nearly half of cybersecurity professionals in a recent survey said that there have been other security incidents like the recent WannaCry attack that they worked on just as frantically without the public ever hearing about it.

Nearly half of cybersecurity professionals in a recent survey said that there have been other security incidents like the recent WannaCry attack that they worked on just as frantically without the public ever hearing about it.

The noteworthy—and somewhat alarming—findings of this survey come from Farsight Security, Inc., a provider of historic and real-time passive DNS (domain name system), which conducted the study at Infosecurity Europe 2017 in London earlier this month. The responses came from 360 information security professionals.

Of the 49 percent of respondents who said yes to the question of if there have been security incidents like WannaCry at their organizations, nearly three quarters (72 percent) said that this type of event, requiring them to work frantically to protect networks from attack, had happened three times in the last year alone.

“WannaCry made the headlines and got the general public listening, however, cybersecurity professionals actually work on incidents like this all throughout the year,” Paul Vixie, Ph.D., CEO and co-founder of Farsight Security, said in a statement.

And, of the 49 percent of respondents who reported other WannaCry-like incidents that were shielded from public view, 20 percent said that these major security events have happened up to six times over the last year alone. “It is easy to forget how common these attacks are and how hard these security professionals are working to keep our national infrastructure and our data secure,” according to Farsight officials.

The WannaCry ransomware attack began on May 12, 2017, and within a day was reported to have infected more than 230,000 computers in over 150 countries. The phenomenon virtually shut down several dozen regional health authorities within the National Health Service of the United Kingdom, in addition to impacting the operations of other diverse entities. As Farsight officials noted, “The WannaCry ransomware exploits a vulnerability in Microsoft Windows, for which a patch was released. However, many corporations do not automatically patch their systems due to issues that a Windows update can cause to their legacy software programs. So, despite the patch being released, not updating left hundreds of thousands of devices open to attack, and held to ransom.”

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...