Organizations are becoming more aware of SQL injection threats and the long process of detection and recovery.
Even if you outsource the “high risk assets” related to your web presence (such as on-line banking), you shouldn’t overlook this attack vector. If you have interactive forms on your website, you may be vulnerable to a SQL injection attack. A report published last week by the Ponemon Institute reveals some interesting statistics on the prevalence of SQL injection attacks and the amount of time required to detect and recover from them.
Of the organizations surveyed, 65% of them had suffered from a known SQL injection attack in the last 12 months. On average, it took these organizations about 140 days to discover the attack and 68 days to recover from it. It was found that 40% say that it takes even longer to detect them; around six months.
On top of that, over half of the organizations surveyed had no testing or third-party validation software in place to detect SQL injection vulnerabilities. A majority are siting the emergence of mobile devices in the office as a deterrent to pinpointing the source of the injection.
The good news is more than half say they will be integrating behavioral analysis-based tools over the next 2 years in order to track activity in their databases. It appears the more and more organizations are becoming aware of the threats SQL injection attacks present and taking precautions to prevent substantial damage.
Original article by Kelly Jackson Higgins.
Read the full story here.