{"id":1967,"date":"2009-12-03T00:00:00","date_gmt":"2009-12-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/03\/security-incidents-at-an-all-time-high\/"},"modified":"2021-12-30T11:40:23","modified_gmt":"2021-12-30T11:40:23","slug":"security-incidents-at-an-all-time-high","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/03\/security-incidents-at-an-all-time-high\/","title":{"rendered":"Security incidents at an all-time high"},"content":{"rendered":"<p>The Computer Security Institute (CSI) pre-released selected findings from its 2009 Computer Crime and Security Survey.  The survey, now in its 14th year, found that average losses due to security incidents are down again this year (from $289,000 per respondent to $234,244 per respondent), though they are still above 2006 figures.<br \/>\nRespondents reported big jumps in incidence of:<br \/>\npassword sniffing (Over 9 percent last year)<br \/>\nWeb site defacement (Over 6 percent last year)<br \/>\nfinancial fraud (Over 12 percent last year)<br \/>\ndenials of service (Over 21 percent last year)<br \/>\nmalware infection (Over 50 percent last year).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A full one-third of respondents&#8217; organizations were fraudulently represented as the sender of a phishing message.<\/p>\n<p>Most respondents felt their investment in end-user security awareness training was inadequate, but most felt their investments in other components of their security program were adequate.<\/p>\n<p>This year&#8217;s survey results are based on the responses of 443 information security and information technology professionals in United States corporations, government agencies, financial institutions, educational institutions, medical institutions and other organizations.<\/p>\n<p>http:\/\/www.net-security.org\/secworld.php?id=8568<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1967","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1967"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1967\/revisions"}],"predecessor-version":[{"id":4454,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1967\/revisions\/4454"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}