{"id":55952,"date":"2021-10-29T13:53:58","date_gmt":"2021-10-29T17:53:58","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=55952"},"modified":"2024-12-20T14:29:21","modified_gmt":"2024-12-20T19:29:21","slug":"hackers-know-breach-detection-gap","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/hackers-know-breach-detection-gap","title":{"rendered":"Hackers Know What You Did Last Summer: Exploring the Breach Detection Gap"},"content":{"rendered":"\n

It\u2019s Cybersecurity Awareness Month! In honor of the theme \u2014 Do Your Part. #BeCyberSmart \u2014 we\u2019re doing our part by educating organizations and IT teams on protecting themselves. Throughout October, the JumpCloud blog will focus on top cybersecurity issues, from IT admin best practices to CISO responsibilities. Tune back into the blog this month for new cybersecurity content or <\/em>check out our archive of existing security articles<\/em><\/a> for cybersecurity insights written specifically for the IT professional. <\/em><\/p>\n\n\n\n

After much of the business world went remote in 2020, data breaches rose significantly \u2014 not just in number, but in cost and impact as well. In fact, IBM found that the average data breach now costs $4.24 million<\/a>. <\/p>\n\n\n\n

The same study found that data breaches take an average of 212 to detect and another 75 days to contain. So if there are any hackers currently on your network, chances are, they know what you did last summer. And even though they probably won\u2019t mail you ominous letters or carry a hook for a hand \u00e0 la the classic \u201890s slasher flick, they can still wreak havoc on your business. <\/p>\n\n\n\n

That\u2019s because, in the 212 days they sat on your network undetected, they had been watching, waiting, and learning. This time window, called the breach detection gap, indicates a problem in the way companies monitor and detect threats on their network.<\/p>\n\n\n\n

Why don\u2019t companies notice breaches sooner? How can they protect themselves against breaches and detect them when they occur? In this blog, we\u2019ll explore causes of the breach detection gap, what can happen when a hacker infiltrates your network without your knowledge, and how to better detect and protect against breaches.<\/p>\n\n\n\n

Breach Detection Gap Driving Factors <\/strong><\/h2>\n\n\n\n

The breach detection gap is the result of both stealth on the hacker\u2019s part and failed detection on the company\u2019s part. Sometimes, hackers choose to wait quietly once they\u2019ve compromised a network to avoid detection. Other times, they may be working in the background and the network failed to detect the threat. Let\u2019s explore each scenario.<\/p>\n\n\n\n