Companies Hit With Security Breaches More Frequently Than Revealed

(Reuters) – Every second a critical infrastructure supplier has been a target of a cyberattack, a survey of security software firm McAfee showed on Thursday. Hackers frequently succeed in attacking businesses, security experts say, but companies rarely disclose the breaches because they are afraid of damaging their reputations and encouraging criminals. This made Google’s statement […]

Jan 28, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

(Reuters) – Every second a critical infrastructure supplier has been a target of a cyberattack, a survey of security software firm McAfee showed on Thursday.

Hackers frequently succeed in attacking businesses, security experts say, but companies rarely disclose the breaches because they are afraid of damaging their reputations and encouraging criminals.

This made Google’s statement of a "highly sophisticated and targeted attack" from China stand out earlier this month.

For the McAfee study the Center of Strategic and International Studies surveyed some 600 IT and security executives from the energy, transport, water and sewage, government, telecoms and financial sectors in 14 countries.

"In most developed countries, critical infrastructure is connected to the Internet and can lack proper security functions, leaving these installations vulnerable," McAfee said.

Some 37 percent of firms believed the threat to critical infrastructure is growing, and two-fifths expect a major cyber security incident within the next year, the survey showed, while one out of five has been a victim of financial extortion.

Greg Day, McAfee’s security analyst, said the biggest surprise in the study was the scale and scope of attacks.

"It is happening at such a major scale and we will certainly see more and more sophisticated attacks," Day said. (Reporting by Tarmo Virki; Editing by Jon Loades-Carter)

© Thomson Reuters 2010. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Thomson Reuters. Thomson Reuters and its logo are registered trademarks or trademarks of the Thomson Reuters group of companies around the world.

Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.
 


Recommended for you...

Concentric AI Adds Integrations to Data Governance Platform

Concentric AI adds Wiz, Salesforce, and GitHub integrations to boost Semantic Intelligence platform’s AI-driven data governance and security capabilities.

Jordan Smith
Aug 15, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
GitHub CEO Steps Down as Microsoft Tightens AI Integration

GitHub CEO Thomas Dohmke to step down in 2025 as Microsoft moves platform into CoreAI, deepening its role in the company’s AI development strategy.

Allison Francis
Aug 13, 2025
Backblaze CEO on GTM Strategy & AI Demand on M&E Datasets

Backblaze CEO on record growth, AI and M&E wins, and how new products and partnerships are driving enterprise cloud storage adoption.

Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.