{"id":213,"date":"2015-03-26T04:12:12","date_gmt":"2015-03-26T04:12:12","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=213"},"modified":"2024-12-23T07:53:15","modified_gmt":"2024-12-23T07:53:15","slug":"multiple-digital-certificate-attacks-affect-100-of-uk-businesses","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/multiple-digital-certificate-attacks-affect-100-of-uk-businesses-213\/","title":{"rendered":"Multiple Digital Certificate Attacks Affect 100% of UK Businesses"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/03\/Snap15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-214 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/03\/Snap15.jpg\" alt=\"Multiple Digital Certificate Attacks Affect 100% of UK Businesses\" width=\"692\" height=\"242\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/03\/Snap15.jpg 692w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/03\/Snap15-300x105.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/03\/Snap15-3x1.jpg 3w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p>All\u2014as in 100%\u2014of UK organizations have responded to multiple attacks on keys and certificates in the past two years.<\/p>\n<p>The Ponemon Institute found that attacks are becoming more widespread as the number of keys and certificates deployed on infrastructure such as web servers, network appliances and cloud services has grown by 40% to almost 24,000 per enterprise over the past two years.<\/p>\n<p>Russian cyber-criminals, for instance, recently stole digital certificates from one of the top five global banks, enabling them to steal 80 million records, while another attack allowed hackers to steal data from 4.5 million healthcare patients.<\/p>\n<p>Despite the ubiquity of the attacks, a full 63% percent of organizations do not know where all keys and certificates are located or how they\u2019re being used. But at least the attacks have led to a modicum of self-awareness: 60% of all surveyed respondents agreed that they need to do a better job at responding to vulnerabilities involving keys and certificates. And 54% noted that the trust established by keys and certificates that is necessary for online banking, shopping and government is in jeopardy.<\/p>\n<p>&#8220;With the rising tide of attacks on keys and certificates, it\u2019s important that enterprises really understand the grave financial consequences,\u201d said Larry Ponemon, chairman and founder of the Ponemon Institute. \u201cWe couldn\u2019t run the world\u2019s digital economy without the system of trust they create. [Organizations] need a wake-up call like this to realize they can no longer place blind trust in keys and certificates that are increasingly being misused by cybercriminals.\u201d<\/p>\n<p>Conducted in the United Kingdom, Australia, France, Germany, and the United States, the report highlights that over the next two years, the potential financial risk facing UK enterprises from attacks on keys and certificates is expected to reach at least \u00a333 million.<\/p>\n<p>As for security professionals specifically, they said that they fear a \u201cCryptoapocalypse\u201d event the most. Coined by researchers at Black Hat 2013, a Cryptoapocalypse would dwarf Heartbleed in scope, complexity and time to remediate.<\/p>\n<p>\u201cWhether they realize it or not, every business and government relies upon cryptographic keys and digital certificates to operate,\u201d said Kevin Bocek, vice president of security strategy and threat intelligence at report sponsor Venafi. \u201cWithout the trust established by keys and certificates, we\u2019d be back to the Internet \u2018stone age\u2019\u2014not knowing if a website, device or mobile application can be trusted.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All\u2014as in 100%\u2014of UK organizations have responded to multiple attacks on keys and certificates in the past two years. The Ponemon Institute found that attacks are becoming more widespread as the number of keys and certificates deployed on infrastructure such as web servers, network appliances and cloud services has grown by 40% to almost 24,000 &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/multiple-digital-certificate-attacks-affect-100-of-uk-businesses-213\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Multiple Digital Certificate Attacks Affect 100% of UK Businesses<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[86,87],"class_list":["post-213","post","type-post","status-publish","format-standard","hentry","category-news","tag-multiple-digital-certificate-attacks","tag-uk-businesses"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":215,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/213\/revisions\/215"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}