Loading...

10 Apr 2026 19:40

Mobile & Digital

GCC Businesses Not Ready for New Global Cyber-Threat Levels

As global cyber-attacks increase in complexity, GCC businesses must prepare themselves for newer and more advanced threat levels, warns Dubai-based IT consultancy, Condo Protego.

The recently published 2015 Internet Security Threat Report (ISTR) by Symantec, a global leader in information protection technology, found that despite a 14 percent decrease in malicious e-mails, and 20 percent fewer targets, highly targeted spear-phishing attacks rose by eight percent in 2014.

In the UAE alone, targeted attacks rose 400 percent in 2014, from less than 1 percent of the global total, to almost 5 percent. Furthermore, the average response time from companies increased from five days in 2013, to 59 days in 2014. These findings confirm increasing intelligence of cybercriminals, and the difficulty faced by organizations to effectively protect their data against such sophisticated attacks.

“While cyberattacks are becoming increasingly complex, many GCC business information security strategies are still limited to basic defence tactics, and, thus expose businesses and stakeholders to high risk,” said Savitha Bhaskar, Chief Operating Officer of Condo Protego.

According to the ISTR, 2014 experienced 24 zero-days, the highest in history. The top five of these resulted in 295 days of attacks before organizations were able to react. Non-targeted attacks also increased by 26 percent throughout the year, with the release of 317 million new pieces of malware.

Cybercriminals continue to improve their attack strategies by acquiring new techniques to avoid detection, and using corporate infrastructures to help breach security. These advancements in their methods have led to an increased number of attacks on larger organisations. According to Symantec, 5 out of 6 large companies were attacked by skilled hackers in 2014, representing an increase of 40 percent from 2013.

“Cybercriminals are looking for information that has monetary value, and can be sold. To extract this potentially dangerous data, rather than approaching large enterprises that are likely to have high security measures in place, cybercriminals are attacking the smaller companies that have access to this information, and limited budgets for security measures, including vendors and partners. It is very important that businesses of all sizes are well protected against both direct and indirect cyberattacks, and that large organizations carefully evaluate the security measures of vendors and partners,” added Bhaskar.

According to experts at Condo Protego, the threat of cyberattacks is now even larger than ever, as Internet of Things (IoT) developments emerge amid regional smart city initiatives. The increasing quantity and value of data being generated is being recognized by cybercriminals, further putting organizations in the region at risk.

NULL
(Visited 15 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBEThttps://premium-soft.com/Consulta-Licencias/https://sintnicolaasschool.com/https://abc1131aa.com/kincir88Slot mahjongABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/era77https://ayodonktolong.pages.dev/stc76sinkronisasi taktik jitu peluang dadu sicbo analisa rtp live gates of olympus strategi pola mahjong wild deluxe patenanatomi kemenangan mutlak taktik pola mahjong ways 2 pgsoft analisa strategi rtp live starlight princess teknik peluang baccaratpemetaan spektrum volatilitas strategi paten peluang blackjack teknik analisa rtp live sweet bonanza taktik pola mahjong wins 3 pragmaticmanajemen bantalan risiko gunakan teknik analisa peluang roulette taktik pola mahjong ways 2 pgsoft strategi rtp live wild west goldnavigasi kontras probabilitas teknik bagus taktik blackjack analisa peluang sv388 strategi pola mahjong wins 3 pragmatic rtp live sugar rushadaptasi kemenangan live casino taktik mahjong ways terbaru pastikan 5 lions megawaysadaptasi rtp live pastikan mahjong ways deluxe memecahkan gates of gatotkacadekonstruksi peluang roullete mampu tingkatkan rtp mahjong ways 2 tanpa sweet bonanza super scattereksplorasi teknik baccarat dengan pola fortune gods pastikan starlight archer 1000fakta terbaru dari dragon tiger mampu wild bounty showdown rtp live gates of olympus deluxeformula rtp live deluxe mahjong wins 3 dengan teknik baccarat tanpa pola aztec gemsmembaca rtp live sicbo algoritma mahjong wins menghasilkan fortune of olympuspenguasaan tanpa pola rtp live deluxe mahjong wins 2 lebih terpercaya starlight princess x1000rasio kemenangan sicbo saat rtp mahjong wins black scatter terbaru sweet bonanza superrasio lebih memilih dragon tiger saat mahjong black scatter menguasai starlight princessrasio lebih memilih roullete saat mahjong ways terpercaya rtp gates of olympus deluxestrategi memecahkan baccarat sesuai mahjong ways deluxe dengan teknik gates of olympusstrategi probabilitas mahjong ways 2 menggunakan baccarat deluxe pecahkan starlight princessstrategi ritme roullete memecahkan peluang mahjong ways 2 pastikan sweet bonanza xmasvoltalitas kemenangan sicbo berhasil capai puncak mahjong ways dengan gates of olympus x1000mekanika kemenangan teknik dadu sicbo analisa pola mahjong wild deluxe taktik rtp live gates of olympussinergi taruhan taktis analisa peluang baccarat teknik pola mahjong ways 2 pgsoft strategi rtp live starlight princessagresi taruhan terstruktur taktik peluang blackjack analisa pola mahjong wins 3 pragmatic teknik strategi rtp live sweet bonanzaeksekusi hibrida terkalkulasi taktik analisa peluang roulette strategi pola mahjong ways 2 pgsoft teknik rtp live wild west golde5 studi pola scatter dan wild dengan pendekatan algoritma moderne5 teknik analisis pola scatter dan wild berbasis algoritmae5 teknik spin efektif untuk mengoptimalkan performa rtpe5 teknik spin modern untuk hasil rtp lebih optimale5 terbongkar cara mengurai pola scatter dan wild dengan sistem algoritmae5 terbukti efektif teknik membaca scatter dan wild dengan sistem moderne5 teruji strategi algoritma ini bikin pola scatter dan wild lebih mudah dipahamie5 wajib tahu pola scatter dan wild bisa dibaca dengan pendekatan inimodulasi risiko algoritma teknik analisa peluang dadu sicbo strategi pola mahjong wild taktik rtp live olympusprotokol eksekusi hibrida analisa peluang baccarat teknik pola mahjong ways 2 taktik strategi rtp live starlight princessekspansi taruhan terukur analisa strategi rtp live sweet bonanza teknik pola mahjong wins 3 pragmatic taktik peluang sv388 blackjackaws interaksi lucky neko preferensi pemainaws momentum simbol mahjong scatter merahaws riset mahjong scatter emas tren rtpaws spin auto mahjong grid simbolaws symbol stutter multiplier olympusaws analisa putaran wild bandito otomatisasiaws analisis statistik simbol ekspektasi dataaws analogi spin otomatis putaran konsistenaws data spin rng pgsoftaws data starlight princess analisis scatteraws evaluasi rtp live data historisaws jeda spin mahjong wins bonusaws koi gate scatter tanpa polaaws pemetaan putaran pgsoft algoritmaaws rtp terbaru target logis pemainmahjong waystrik rahasia kemenanganpola baru mahjongstrategi amhjongstrategi unggul mahjongdragon tiger mahjong scatterrtp mahjong wins terbarumahjong wins tanpa polartp live mahjong winsformula mahjong wins 3strategi mahjong ways pg soft rahasia suhurahasia pg soft sensasi main mahjong ways 2visual manja mahjong ways terbaru animasicara baca simbol transisi mahjong ways 2rahasia dimensi waktu hasil mahjong wins 3pola mahjong agresif bonus besar tanpa hokistrategi mahjong agresif banjir bonus terbarurumus sakti mahjong ways 2 pola gacorbocoran eksklusif mahjong ways 2 indikator liveupdate analisis mahjong ways 2 waktu main Top