Sharp rise in fileless attacks evading endpoint security

A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. 54 percent of respondents said their company experienced a successful attack. Of those respondents, 77 percent were victim to fileless attack or exploit.

fileless attacks evading endpoint security

“This survey reveals that ignoring the growing threat of fileless attacks could be costly for organizations.” said Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute. “The cost of endpoint attacks in the companies represented in this study could be as much as $5 million, making an enterprise-wise endpoint security strategy more important than ever.”

To address the rising threat of fileless attacks, over 50% of organizations looked to replace or augment their existing endpoint security with new tools designed to stop fileless attacks.

Even with the transition to next generation security, organizations cited protection gaps, high false positive rates and complexity of management as top challenges with new solutions. False positives, for example, were ranked as the most significant “hidden” cost of endpoint protection comprising 48% of all security alerts.

With fileless attacks on the rise, and false positives accounting for almost half of all alerts, it is no surprise that only 36% of organizations report having enough resources to effectively manage it all.

fileless attacks evading endpoint security

“Based on this research, organizations need a strategy in place to block fileless attacks, which are responsible for the majority of today’s endpoint compromises. To restore their faith in endpoint security, new solutions also need to address the crucial gap in advanced protection without adding unnecessary complexity and alarming false positive rates to endpoint management.” said Mike Duffy, CEO of Barkly.

Are you protecting your users and sensitive O365 data from being leaked? Learn how Specops Authentication for O365 can help.