<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>benchmark - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/benchmark-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/benchmark-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 25 Oct 2021 11:34:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>benchmark - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/benchmark-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyberattacks in 2021: ransomwares, still threat n°1</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/#respond</comments>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Wed, 20 Oct 2021 11:23:00 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[benchmark]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[Incident response]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17170</guid>

					<description><![CDATA[<p>On the launch of the European Cybersecurity Month and for the Assises de la Sécurité (from 13 to 16 October 2021), Wavestone unveils the new edition of its benchmark of cybersecurity incidents.  To this end, we reviewed the interventions of the CERT-Wavestone crisis...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/">Cyberattacks in 2021: ransomwares, still threat n°1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">On the launch of the European Cybersecurity<strong> Month and for the Assises de la Sécurité</strong> (from 13 to 16 October 2021), <strong>Wavestone unveils the new edition of its benchmark of cybersecurity incidents</strong>.  To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.</p>
<p style="text-align: justify;">This represents <strong>60 major security incidents</strong> that led to business interruption or advanced IS compromise in a diverse sector:  industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is <strong>to shed light on and show the evolution of the state of the cyber threats, </strong>whilst also providing the keys for better anticipation and reaction.</p>



<h2 class="wp-block-heading"><strong>A strong preponderance of ransomware in the panorama of cyberattacks</strong></h2>



<div class="wp-block-image"><figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="1255" height="505" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057.png" alt="" class="wp-image-17195" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057.png 1255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Screenshot-2021-10-25-132057-768x309.png 768w" sizes="(max-width: 1255px) 100vw, 1255px" /></figure></div>



<p>  </p>
<p style="text-align: justify;">Ransomware accounts for<strong> 60%</strong> of the cyberattacks encountered by CERT-W for our customers. Furthermore, attackers are becoming increasingly more organized and skilled at carrying out more effective attacks</p>



<p><em>&#8220;Cybercriminal groups have succeeded in their digital transformation and their organization into a platform has made it possible to majorly make their attacks more efficient and faster&#8221; Gerôme Billois, Partner Cybersecurity</em></p>



<p style="text-align: justify;">Beyond the simple blocking of the IS, <strong>the combination with data theft is becoming more and more present</strong>. Indeed, <strong>30%of the ransomware attacks observed  include combine the blocking of the IS and the theft of data</strong>,  the latter being an additional lever to obtain financial gains.</p>



<h2 class="wp-block-heading"><strong>Faster and more targeted ransomware</strong> <strong>attacks</strong></h2>



<p style="text-align: justify;">We see a reduction in the average time between initial access and deployment of ransomware in the system with<strong> a minimum of 3 days for the fastest attack and an average of 25 days</strong> on managed cases. Attackers are becoming <strong>more and more determined to harm their victims</strong>.  Indeed, they now go so far as to target and destroy the backup mechanisms  in order to force the payment of the ransom  (21% of  cases).</p>
<p style="text-align: justify;">We also find that in<strong> 90% of cases data has been irretrievably lost.</strong> It should be noted that  we are seeing a significant decrease in ransom payments this year (from 20% the previous year to 5% of cases). Multiple factors can  explain  this decrease, between the better understanding of the low interest to be paid  (the payment of the ransom does not accelerate the time of resolution of the crisis), the actions of awareness  and pressure on the payment intermediaries by the different authorities.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img decoding="async" width="2000" height="1125" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6.png" alt="" class="wp-image-17191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6.png 2000w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture6-800x450.png 800w" sizes="(max-width: 2000px) 100vw, 2000px" /></figure></div>



<p>   </p>



<h2 class="wp-block-heading"><strong>Other types of attacks are still raging in the background</strong></h2>



<div class="wp-block-image"><figure class="aligncenter size-full"><img decoding="async" width="1974" height="1076" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7.png" alt="" class="wp-image-17193" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7.png 1974w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-768x419.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Picture7-1536x837.png 1536w" sizes="(max-width: 1974px) 100vw, 1974px" /></figure></div>



<div class="row-container onepage-section" data-parent="true" data-label="Parce qu'il est important de faire du maillage interne" data-name="parce-quil-est-important-de-faire-du-maillage-interne" data-section="5">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode_text_column">
<p> </p>
<p style="text-align: justify;">The ransomware threat should not make us forget the attacks <strong>of data theft, fraud and the gain in attack capacity that remain well present (25%)</strong> even if they are less frequent.  </p>
<p style="text-align: justify;">When it comes to accessing channels to break into systems, the main gateways are still the <strong>use of valid accounts (23%), fraudulent emails,  <em>phishing</em>  to obtain information (20%) and remote access services using security vulnerabilities or configuration defects  (18%)</strong>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="6">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="heading-text el-text">
<h2 class="h2"> </h2>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>



<h2 class="wp-block-heading"><strong>How not to be an easy target? Some tips from CERT-W</strong></h2>



<div class="uncode_text_column">
<p style="text-align: justify;"><strong>56% of victims did not anticipate </strong>being the <strong>potential</strong> <strong>target  of a </strong> <strong>cyberattack.</strong> They  did not have an incident response contract or a cyber insurance and 42% of  victims had not thought about  their resilience in the event of an attack</p>
</div>



<p>&#8220;Even if diplomatic and judicial actions have weakened the cybercriminal ecosystem, it is not a question of stopping efforts, we must prepare now thanks to simple actions to put in place&#8221; Nicolas Gauchard, Head of CERT-W</p>



<div class="messagebox_text style-accent-bg">
<p><span style="color: #503078;"><strong>The most important actions are known:</strong></span></p>
<ol>
<li><span style="color: #503078;"><strong>Identify and protect the most critical systems and data, including mention technical systems such as Active  Directory</strong></span></li>
<li><span style="color: #503078;"><strong>Improve the efficiency of attack detection with a specialized 24/7 service</strong></span></li>
<li><span style="color: #503078;"><strong>Know how to manage a major crisis by training through crisis management exercises</strong></span></li>
<li><span style="color: #503078;"><strong>Strengthen backup security and practice rebuilding immediately</strong></span></li>
<li><span style="color: #503078;"><strong>Subscribe to a cyber insurance and a contract with a specialized service in case of crisis</strong></span></li>
</ol>
</div>
<p> </p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link has-white-color has-text-color has-background" href="" style="background-color:#503078" target="_blank" rel="noreferrer noopener">Download the publication</a></div>



<div class="wp-block-button"><a class="wp-block-button__link has-white-color has-text-color has-background" href="" style="background-color:#503078" target="_blank" rel="noreferrer noopener">Contact-us</a></div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/">Cyberattacks in 2021: ransomwares, still threat n°1</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/cyberattacks-in-2021-ransomwares-still-threat-n1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Industrial sites cybersecurity : benchmark on 40 assessments</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/05/industrial-sites-cybersecurity-benchmark-on-40-assessments/</link>
		
		<dc:creator><![CDATA[Arnaud Soullié]]></dc:creator>
		<pubDate>Wed, 26 May 2021 09:28:12 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[benchmark]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[study]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15876</guid>

					<description><![CDATA[<p>Over 40 assessments of industrial sites Over the past two years, Wavestone’s auditors have conducted more than 40 cybersecurity assessments of industrial sites in various sectors (pharmaceutical, food processing, energy, etc.). These assessments have enabled us to benchmark the level of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/05/industrial-sites-cybersecurity-benchmark-on-40-assessments/">Industrial sites cybersecurity : benchmark on 40 assessments</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="heading-text el-text">
<h2 class="h2">Over 40 assessments of industrial sites</h2>
</div>
<div class="uncode_text_column">
<p>Over the past two years, Wavestone’s auditors have conducted more than 40 cybersecurity assessments of industrial sites in various sectors (pharmaceutical, food processing, energy, etc.).</p>
<p>These assessments have enabled us <strong>to benchmark the level of cybersecurity of these sites on a selection of themes.</strong></p>
</div>
<figure id="post-15877 media-15877" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15877 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-1-EN.png" alt="" width="2004" height="1125" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-1-EN.png 2004w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-1-EN-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-1-EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-1-EN-768x431.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-1-EN-1536x862.png 1536w" sizes="auto, (max-width: 2004px) 100vw, 2004px" /></figure>
<div class="uncode_text_column">
<div class="heading-text el-text">
<h2 class="h2">Our assessment methodology</h2>
</div>
<div class="uncode_text_column">
<p>Wavestone has developed an <strong>industrial site assessment framework</strong>, adaptable to the specificities of the sector or the client, allowing a global assessment of the cybersecurity level of a site or a production line.</p>
</div>
</div>
<figure id="post-15879 media-15879" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15879 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-EN.jpg" alt="" width="1405" height="719" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-EN.jpg 1405w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-EN-373x191.jpg 373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-EN-71x36.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/05/Image-2-EN-768x393.jpg 768w" sizes="auto, (max-width: 1405px) 100vw, 1405px" /></figure>
<div class="uncode_text_column">
<div class="heading-text el-text">
<h2 class="h2">Focus on 5 key themes</h2>
</div>
<div class="uncode_text_column">
<p>This benchmark of the level of cybersecurity of industrial sites is based on a selection of themes: <strong>governance</strong>, <strong>network segmentation</strong>,<strong> remote access</strong>, <strong>system administration </strong>and <strong>resilience</strong>. For each of these categories, we share successes, failures and recommendations, concluding with our key actions to get a good start on a site security program.</p>
</div>
</div>
<p>If you want to know more, you can find the <a href="https://www.wavestone.com/app/uploads/2021/04/Industrial-sites-cybersecurity-benchmark-EN-1.pdf">detailed study</a>.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/05/industrial-sites-cybersecurity-benchmark-on-40-assessments/">Industrial sites cybersecurity : benchmark on 40 assessments</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
