• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Private Equity Firms Exposed by Cyber-Hygiene Shortcomings

flyytech by flyytech
November 21, 2022
Home Security
Share on FacebookShare on Twitter


Private equity firms are failing to adequately manage cyber-risk in their portfolio companies, with a fifth (19%) of such businesses found to feature easily exploitable vulnerabilities, according to BlueVoyant.  

The security vendor chose a group of private equity firms at random and analyzed the 780 unique portfolio companies they had invested in to compile its report, Private Equity A Look at Portfolio Company Cyber Risk.

It revealed that 149 of these companies, or around a fifth of the total, had so-called “zero tolerance findings.” BlueVoyant categorizes these as:

  • Known critical vulnerabilities in software on internet-facing systems, where a patch is available
  • Malicious activity, involving “beaconing” from inside the organization to known malicious infrastructure
  • IT hygiene, specifically open or misconfigured ports exposed to the internet, which can be probed to gain access via credential stuffing and other techniques

The companies impacted had between one and 11 of these findings, with more than half having two or more and almost a quarter having six or more.

Some 70% of critical internet-facing findings came in the area of IT hygiene.

Here, the most common open or misconfigured ports related to remote desktop protocol (RDP), a major vector for ransomware. This accounted for 27% of findings, versus 18% for Server Message Block (SMB) and 17% for Windows Remote Management (WinRM).

Most impacted portfolio companies were located in the US (222) and the UK (133) although proportionately these countries fared better than the average, representing just 13% and 12% of the total respectively.

Those companies in the tech sector were twice as likely as the average portfolio firm to feature zero tolerance findings, at 39%. Those in professional services (21%) were about average, while retail (17%), manufacturing (16%), financial services (13%) and healthcare (12%) fared better.

BlueVoyant claimed that while private equity firms recognize the importance of cyber-risk, many prioritize “speed of deal” over due diligence. The vendor argued that point-in-time assessments are not sufficient for managing risk amid constantly evolving threats and technologies.

The financial repercussions of a serious security breach could be significant for private equity firms, BlueVoyant argued.

“When it comes to private equity portfolio companies, we see a wide range of cyber-defense postures,” said Dan Vasile, vice president of strategic development at the firm.

“Cybersecurity as a subset of risks is sometimes overlooked. This analysis confirms the need to prioritize cyber-defense in order to protect portfolio company value. The private equity space is beginning to get on track. However, we must button-up the entire process to protect those vulnerable entities, as well as ramping up cyber-defense against less easily exploitable but equally damaging threats.”



Source_link

flyytech

flyytech

Next Post
India issues guidelines to curb fake reviews on e-commerce platforms • TechCrunch

India issues guidelines to curb fake reviews on e-commerce platforms • TechCrunch

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Wormable Flaw, 0days Lead Sept. 2022 Patch Tuesday – Krebs on Security

Wormable Flaw, 0days Lead Sept. 2022 Patch Tuesday – Krebs on Security

September 14, 2022
What Kind of Data Gets Stolen When a Developer is Compromised?

What Kind of Data Gets Stolen When a Developer is Compromised?

December 23, 2022

Trending.

Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
Volla Phone 22 review

Volla Phone 22 review

March 26, 2023
USIU student team qualifies for Microsoft Imagine Cup World Championship

USIU student team qualifies for Microsoft Imagine Cup World Championship

April 5, 2023
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
Google 3D animals & AR objects: Full list & gallery

Google 3D animals & AR objects: Full list & gallery

December 27, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Blockchain security companies tackle cryptocurrency theft, ransom tracing

Atomic Wallet hack leads to at least $35M in stolen crypto assets

June 5, 2023
Canon 35mm f/1.2 optical formula appears, along with a 12mm f/1.2

Canon 35mm f/1.2 optical formula appears, along with a 12mm f/1.2

June 5, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT