More Orgs Use Booby Traps for Counterintelligence
Neustar recently released a new report showing that one out of five organizations use forensic investigations and other techniques in order to identify attackers. Other possible methods include the use of honeypots and collections of fake data to lure threat actors. If a threat actor falls for the trap and begins interacting with fake data, 71% of companies would let them steal phony or booby-trapped files, rather than shut down the attack.
The survey also found that according to companies, the top growing cyber threats are phishing (52%), targeted hacking (49%) and distributed denial-of-service (DDoS) attacks (49%). Just over half (51%) of organizations have at some point experienced a DDoS attack.