Loading...

24 May 2026 11:41

Mobile & Digital

GCC Businesses Not Ready for New Global Cyber-Threat Levels

As global cyber-attacks increase in complexity, GCC businesses must prepare themselves for newer and more advanced threat levels, warns Dubai-based IT consultancy, Condo Protego.

The recently published 2015 Internet Security Threat Report (ISTR) by Symantec, a global leader in information protection technology, found that despite a 14 percent decrease in malicious e-mails, and 20 percent fewer targets, highly targeted spear-phishing attacks rose by eight percent in 2014.

In the UAE alone, targeted attacks rose 400 percent in 2014, from less than 1 percent of the global total, to almost 5 percent. Furthermore, the average response time from companies increased from five days in 2013, to 59 days in 2014. These findings confirm increasing intelligence of cybercriminals, and the difficulty faced by organizations to effectively protect their data against such sophisticated attacks.

“While cyberattacks are becoming increasingly complex, many GCC business information security strategies are still limited to basic defence tactics, and, thus expose businesses and stakeholders to high risk,” said Savitha Bhaskar, Chief Operating Officer of Condo Protego.

According to the ISTR, 2014 experienced 24 zero-days, the highest in history. The top five of these resulted in 295 days of attacks before organizations were able to react. Non-targeted attacks also increased by 26 percent throughout the year, with the release of 317 million new pieces of malware.

Cybercriminals continue to improve their attack strategies by acquiring new techniques to avoid detection, and using corporate infrastructures to help breach security. These advancements in their methods have led to an increased number of attacks on larger organisations. According to Symantec, 5 out of 6 large companies were attacked by skilled hackers in 2014, representing an increase of 40 percent from 2013.

“Cybercriminals are looking for information that has monetary value, and can be sold. To extract this potentially dangerous data, rather than approaching large enterprises that are likely to have high security measures in place, cybercriminals are attacking the smaller companies that have access to this information, and limited budgets for security measures, including vendors and partners. It is very important that businesses of all sizes are well protected against both direct and indirect cyberattacks, and that large organizations carefully evaluate the security measures of vendors and partners,” added Bhaskar.

According to experts at Condo Protego, the threat of cyberattacks is now even larger than ever, as Internet of Things (IoT) developments emerge amid regional smart city initiatives. The increasing quantity and value of data being generated is being recognized by cybercriminals, further putting organizations in the region at risk.

NULL
(Visited 17 times, 1 visits today)
peri hokiperihokiduta 76AWSBEThttps://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjonghttps://www.abc1131.it.com/stc76duta76duta76bduta76 sejiwaduta76 lokasiterdekatduta76 africafuelduta76 oscarmykeduta76 naptimepkduta76 daikinduta76 raes-munichlaporan pengujian ritme putaran fitur unggulan pragmatic playmahjong ways 2 warisan lokal simbol budaya modern stabilitas sosialstruktur algoritma stabilitas hasil mekanik mahjong ways analitis detailhubungan fluktiasi rtp live performakombinasi unik simbol hasil pgsoftmomentum perubahan perkalian pragmatic playlonjakan rahasia frekuensi mahjong ways 2perofrma multiplier besar olympusteori rtp koi gate tengah malamanalisa taktik silang pola mahjong wild deluxe peluang dadu usicbo rtp live gates of olympuspemetaan taktik cerdas strategi peluang baccarat teknik pola analisa rtp live starlight princess mahjong ways 2 pgsoftstrategi hibrida kuantitatif analisa peluang blackjack teknik pola taktik rtp live mahjong wins 3 pragmatic sweet bonanzametodologi hibrida cerdas taktik peluang roulette analisa strategi pola rtp live mahjong ways 2 pgsoft wild west goldsinkronisasi strategi pro teknik peluang blackjack sv388 analisa pola rtp live sugar rush mahjong wins 3 pragmaticeksekusi taktik jitu dengan presisi analisa rtp gates of olympus teknik pola mahjong wild deluxe dadu sicboanalisa teknik kuantitatif peluang baccarat strategi pola rtp live mahjong ways 2 pgsoft starlight princesssinkronisasi strategi pro analisa peluang taktik blackjack teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzamasterclass eksekusi cerdas analisa peluang roulette strategi pola teknik rtp live mahjong ways 2 pgsoft wild west goldblueprint taktik presisi strategi peluang blackjack sv388 analisa teknik pola rtp live sugar rush mahjong wins 3 pragmaticalgoritma terbaru scatter emas mahjong wins 3 investigasidetik wild konek beruntun mahjong ways klasik permainanfenomena scatter merah mahjong ways 2 sistem keamananpembuktian scatter hitam mahjong ways 2 komunitas pg softrahasia kombinasi wild berjejer mahjong wins pembayaran drastis323324325326327328329330331332penguraian multiplier starlight princessdistribusi wild wild bounty showdowncara membaca rtp mahjong ways 2analisis inferensial pola gates of olympus objektif sisteminovasi grafis pgsoft transisi gambar lebih responsif modernkarakteristik simbol emas mahjong ways 2 pertengahan sesimemanfaatkan ritme putaran mahjong ways 2 server stabilsolusi cerdas volatilitas starlight princess sistem putaranskalabilitas engine html5 multiplier mahjong ways 2mekanisme threading server komputasi mahjong wins 3dekonstruksi algoritma spasial koordinat scatter hitamstudi desain ux interaktif frame emas mahjong ways 2audit protokol enkripsi data rtp mahjong wins 3distribusi rtp gates of olympusinterpretasi rtp mahjong waysanalisis algoritma mahjong ways 2 vs wins 3evolusi fitur scatter hitam mahjongstrategi pola tumble mahjong ways 2data rtp mahjong wins 3 vs klasikmitos fakta mekanika scatter hitam Top