Most Hackers Need 5 Hours or Less to Break Into Enterprise Environments

Teilen:

Not all hackers have bad intentions. For example, ethical hackers are called in to expose certain vulnerable spots in digital security. For example, Daniel Verlaan is an ethical hacker. In 2020, he made the international press when he gave himself access to an online meeting between European defense ministers. The European ministers were shocked because this showed that their networks and systems were more vulnerable than expected.

Verlaan wanted to wake up the public figures involved. In this case, Verlaan’s hacking attempt had no harmful consequences. But an unethical hacker could have done a lot more damage. And unlike Verlaan, a real hacker would not make himself known. Most victims only find out they have been hacked after the bird has flown long and wide.

Hacked in five hours

SANS Institute is a renowned cybersecurity company. This year they conducted an extensive study into the digital security of companies. 300 ethical hackers participated in this study. The purpose of the research was to find out how hackers think, how they operate, who they target, and how long it takes them to hack. The results of this study were both surprising and frightening at the same time.

It turned out that it takes an average hacker about 5 hours to break into a business environment. Time started ticking from the moment they found a security vulnerability. Finding such a vulnerability also takes time. 57% of ethical hackers indicated that they needed a maximum of 10 hours to do this. 5% had already detected the vulnerability within 1 hour. 11% took 1 to 2 hours. 25% had identified the vulnerable spot within three to five hours, and 16% within six to ten hours.

Once discovered, 58% of hackers gained access to the corporate environment in 5 hours or less. 7% even managed to do this within an hour. Connections with third parties, the rapid development of apps, clouds, working from home, and mergers and acquisitions proved particularly risky. But it was ultimately faulty settings, vulnerable software, and poor security of confidential data that ultimately topped the list of threats. The same goes for insufficient authentication and access controls.

The detection of vulnerabilities up to and including the execution of harmful actions can usually occur within 24 hours. It should be noted that the ethical hackers had to operate within a legal framework. A malicious hacker can use illegal methods, which means the hacking can also occur more quickly.

Easy Victims

The survey results again showed how bad the situation is with digital security within the business community. And that’s bad news because it also puts our data at risk. Companies are obliged to handle this with care and do everything in their power to protect them. Unfortunately, reality paints a much more pessimistic picture. As much as companies would like to, hackers still outsmart them far too often. You should remember that hackers usually choose the path of least resistance. The pond in which they can fish is very large. If a potential victim offers too much resistance, they quickly aim their arrows at an easier victim.

Resistance

To protect yourself and sensitive company information, you should try to make it as difficult as possible for hackers. Everything depends on a secure internet connection, especially if employees often work from home. A VPN USA adds an extra layer of protection to your connections. Data is exchanged with a VPN server through an encrypted tunnel. The VPN server encrypts that data. And then, the VPN server forwards the encrypted data to the internet provider’s server. The advantage is that hackers can no longer intercept or read the data.

Also, log-in details too often prove to be a weak spot. Hackers can guess employees’ passwords and gain access to the corporate environment. Therefore, ensure that employees choose unique and hard-to-guess passwords. Regular updates certainly can’t hurt too. And if an employee no longer works for the company, the account should be deleted as soon as possible.

https://gritdaily.com/most-hackers-need-5-hours-or-less-to-break-into-enterprise-environments/

Most Hackers Need 5 Hours or Less to Break Into Enterprise Environments

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
1:46 pm, Juli 8, 2025
Wetter-Symbol 22°C
L: 21° | H: 23°
klarer Himmel
Luftfeuchtigkeit: 40 %
Druck: 1018 mb
Wind: 4 mph WNW
Windböe: 10 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 0%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:53 am
Sonnenuntergang: 9:17 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
21° | 23°°C 0 mm 0% 7 mph 40 % 1019 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
16° | 26°°C 0.1 mm 10% 8 mph 59 % 1023 mb 0 mm/h
Do. Juli 10 10:00 pm
Wetter-Symbol
18° | 30°°C 0 mm 0% 7 mph 75 % 1024 mb 0 mm/h
Fr. Juli 11 10:00 pm
Wetter-Symbol
19° | 29°°C 0 mm 0% 9 mph 68 % 1023 mb 0 mm/h
Sa. Juli 12 10:00 pm
Wetter-Symbol
18° | 28°°C 0 mm 0% 11 mph 71 % 1020 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
23° | 24°°C 0 mm 0% 7 mph 37 % 1018 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 7 mph 32 % 1017 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
19° | 19°°C 0 mm 0% 4 mph 40 % 1019 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 50 % 1020 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 4 mph 58 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 4 mph 51 % 1021 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
21° | 21°°C 0 mm 0% 6 mph 59 % 1022 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 8 mph 56 % 1022 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,756.06
0.24%
Ethereum(ETH)
€2,197.51
0.99%
Fesseln(USDT)
€0.85
0.01%
XRP(XRP)
€1.96
0.83%
Solana(SOL)
€129.39
-0.20%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.145915
0.79%
Shiba Inu(SHIB)
€0.000010
1.39%
Pepe(PEPE)
€0.000009
0.69%
Nach oben scrollen