White Paper

2017 Cyberthreat Defense Report

Source: Webroot
Advice For Protecting Key Evidence After A Cyberattack

A CbyerEdge Group, LLC. Study used with permission from Webroot

The first three installments of the Cyberthreat Defense Report (CDR) began the process of looking beyond major breaches and the never-ending evolution of cyberthreats to better understand what IT security teams are doing to defend against them. Let’s face it. We all know that ransomware ran rampant in 2016. More valuable to most IT security professionals than the intimate details of the next variant to emerge on the scene are the tactics and technologies other organizations are using to defend against it. Highlights of what we learned from earlier editions of the CDR include:

  • One in four security professionals doubts their organization has invested adequately in cyberthreat defenses (2014).
  • Mobile devices and social media applications are IT security’s “weakest links” (2015).
  • Nearly nine out of 10 organizations are looking to replace or augment their endpoint security tools (2016).