• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Cisco Releases 2018 Cyber Security Report: 6 Things You Need to Know

One of the most effective weapons today’s IT security professionals have at their disposal is knowledge – and there is plenty of that packed within the pages of Cisco’s 2018 Annual Cyber Security Report. This year’s report includes insights gleaned from Cisco’s own threat experts, from those of its partners, and from roughly 3600 professionals representing more than two dozen countries. All of that combined experience could prove invaluable to organizations looking to avoid the negative headlines generated last year by the likes of Equifax, Yahoo, and Uber to name a few.

Let’s take a look at six takeaways from the report and how each should factor into your cyber security plans for the rest of 2018 and beyond:

Takeaway #1: Machine learning dramatically boosts threat detection

Attackers have grown adept at co-opting legitimate technologies and then using them against businesses. This has proven to be a popular attack vector, particularly in the case of encryption. Cisco’s report cites a 12-point increase in encrypted traffic traversing the Web between November 2016 and October 2017. During that same period, researchers observed a threefold increase in suspicious traffic leveraging encryption.

Action Item: Machine learning solutions can cut through such smokescreens, quickly identifying activity patterns consistent with known-known (common) threats as well as known-unknown (variations of more common) threats. Additionally, this technology can sift through complex behaviors to spot signs of potential unknown-unknown, or emerging threats.

Takeaway #2: Buying the “best” yet netting uneven results

Some security professionals swear by the so-called “best of breed” approach in which they pick and choose solutions from a multitude of vendors. The reasons cited for preferring this approach over a more integrated solution include the fact that it’s easier to conform to their needs, plus they see it as more cost effective. One thing best of breed is not, in this context, is easier to manage. Products not designed to work together can result in much more to do for admins and can lead to the security gaps attackers love.

Action Item: While a one vendor, fully integrated security environment might not be an option for all, consideration must be given to finding solutions able to integrate with each other – or perhaps even a third party service that can ease the workload generated by managing these disparate technologies.

Takeaway #3: Alerts are often seen but not acted upon

Included in the Annual Cyber Security Report is a wealth of statistics depicting organizational struggles to run down and remediate the alerts created by their monitoring systems. In terms of organizations that receive daily security alerts, 44% of those alerts go uninvestigated. Furthermore, only 51% of alerts deemed legitimate are actually remediated, meaning just under half of legitimate alerts are going unaddressed.

Action Item: Businesses must take strides to close this chasm, although many are struggling to find or afford the expertise needed to do so. Still, leaving legitimate threats unattended seems a large enough risk to inspire organizations to explore alternative solutions, including using third party vendors to add expertise without increasing in-house staff size.

Takeaway #4: Good help is hard to find – and costly to retain

As mentioned above, too many organizations fail to investigate and remediate alerts and incidents due to a lack of in-house talent. There are precious few resources with the specialized knowledge needed to strengthen organizational security postures. As such, competition for these resources is through the roof – as are the costs of landing and keeping it.

Action Item: Organizations should look to a strategic partner for help with their security needs. By doing so, they can address everything from the hands-on duties of supporting solutions, to the executive level expertise necessary to instill and amend corporate security strategies. In this way, they’ll gain the know-how needed without incurring the rising costs associated with it.

Takeaway #5: Cloud offers security – but it too must be monitored

Some 57% of respondents cited in the Annual Cyber Security Report see the cloud as offering better data security. While it’s true that the cloud can provide something of a data safe haven, it’s not immune to assault. In many organizations, cloud has created a gray area. Different lines of business spin up applications independent of IT and then go about their work. The responsibility for managing – and securing – this new environment is left up in the air. Much like encryption, cloud becomes another legitimate resource hackers can turn against the business.

Action Item: Businesses must be prepared to monitor and defend their cloud environments just as they would their on premises data centers. This means investing in solutions designed to automatically enforce corporate policies concerning data stored in the cloud as well as hardening cloud-based applications and infrastructure.

Takeaway #6: Malicious email campaigns never go out of style

Times may change, but email will always remain a popular attack vector for cyber criminals. With the right blend of social engineering prowess and advanced malware, attackers can bypass organizational controls and make direct access with a possible target. Should that person make the mistake of opening an attachment or clicking on a link, they can set off a chain reaction across their organization, opening the door for ransomware or even something worse, like a NotPetya-style data destroyer.

Action Item: Organizations must layer security on top of their email platforms whether they resides on premises or in the cloud. However, tools are only part of the equation. They must also make time to train employees at every level of the business – and across departments – on how to identify malicious messages.

Next Steps: Building a security program to contend with today’s threats

If you’d like to learn about how Arraya’s Cyber Security team can help you address these action items or any of the trends highlighted in Cisco’s 2018 Annual Cyber Security Report, visit us now at arrayasolutions.com/solution/security/.

Don’t forget that we’re listening! Leave us your comments or questions on this or any of our blogs via social media. We can be found on LinkedIn, Twitter, and Facebook. After you’ve let us know what you think of a post, follow us so you can stay updated on our latest industry insights and be the first to know about our upcoming opportunities to advance your IT knowledge.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}