Top 10 security misperceptions

Issue 4 2021 Information Security, Security Services & Risk Management

The Sophos Rapid Response team has compiled a list of the most commonly held security misperceptions they’ve encountered in the last 12 months while neutralising and investigating cyberattacks in a wide range of organisations.

Below is a list of the top 10 misperceptions, together with a Sophos counterpoint dispelling each of them based on incident responders’ experience and observations at the frontline of attacks.

Misperception 1: We are not a target; we are too small and/or have no assets of value to an adversary.

Sophos Counterpoint: Many cyberattack victims assume they are too small, in a sector of no interest or lacking the kind of lucrative assets that would attract an adversary. The truth is, it doesn’t matter: if you have processing power and a digital presence, you are a target. Despite the media headlines, most attacks are not perpetrated by advanced nation-state attackers; they are launched by opportunists looking for easy prey and low hanging fruit, such as organisations with security gaps, errors or misconfigurations that cybercriminals can easily exploit.

If you believe that your organisation is not a target, you are probably not actively looking for suspicious activity on your network – such as the presence of Mimikatz (an open-source application that allows users to view and save authentication credentials) on your domain controller – and you could miss the early signs of an attack.

Misperception 2: We don’t need advanced security technologies installed everywhere.

Sophos Counterpoint: Some IT teams still believe that endpoint security software is enough to stop all threats and/or they don’t need security for their servers. Attackers take full advantage of such assumptions. Any mistakes in configuration, patching or protection make servers a primary target, not a secondary one as might have been the case in the past.

The list of attack techniques that try to bypass or disable endpoint software and avoid detection by IT security teams grows longer by the day. Examples include attacks operated by humans that exploit social engineering and multiple points of vulnerability to gain entry; heavily packed and obfuscated malicious code injected direct into memory; ‘fileless’ malware attacks such as reflective DLL (Dynamic Link Library) loading; and attacks using legitimate remote access agents like Cobalt Strike alongside everyday IT admin tools and techniques. Basic anti-virus technologies will struggle to detect and block such activity.

Similarly, the assumption that protected endpoints can prevent intruders from making their way to unprotected servers is a mistake. According to the incidents Sophos Rapid Response has investigated, servers are now the number one target for attack and attackers can easily find a direct route using stolen access credentials. Most attackers also know their way around a Linux machine. In fact, attackers often hack into and install backdoors in Linux machines to use them as safe havens and to maintain access to a target’s network.

If your organisation relies only on basic security, without more advanced and integrated tools such as behavioural and AI-based detection and a 24/7 human-led security operations centre – then intruders will likely find their way past your defences eventually.

Last but not least, it is always worth remembering that while prevention is ideal, detection is a must.

Misperception 3: We have robust security policies in place.

Sophos Counterpoint: Having security policies for applications and users is critical. However, they need to be checked and updated constantly as new features and functionality are added to devices connected to the network. Verify and test policies, using techniques such as penetration testing, table top exercises and trial runs of your disaster recovery plans.

Misperception 4: Remote Desktop Protocol (RDP) servers can be protected from attackers by changing the ports they are on and introducing multi-factor authentication (MFA).

Sophos Counterpoint: The standard port used for RDP services is 3389, so most attackers will scan this port to find open remote access servers. However, the scanning will identify any open services, regardless of the port they are on, so changing ports offers little or no protection on its own.

Further, while introducing multi-factor authentication is important, it won’t enhance security unless the policy is enforced for all employees and devices. RDP activity should take place within the protective boundary of a virtual private network (VPN), but even that cannot fully protect an organisation if the attackers already have a foothold in a network. Ideally, unless its use is essential, IT security should limit or disable the use of RDP internally and externally.

Misperception 5: Blocking IP addresses from high-risk regions such as Russia, China and North Korea protects us against attacks from those geographies.

Sophos Counterpoint: Blocking IPs from specific regions is unlikely to do any harm, but it could give a false sense of security if you rely only on this for protection. Adversaries host their malicious infrastructure in many countries, with hotspots including the US, the Netherlands and the rest of Europe.

Misperception 6: Our backups provide immunity from the impact of ransomware.

Sophos Counterpoint: Keeping up-to-date backups of documents is business critical. However, if your backups are connected to the network, then they are within reach of attackers and vulnerable to being encrypted, deleted or disabled in a ransomware attack.

It is worth noting that limiting the number of people with access to your backups may not significantly enhance security as the attackers will have spent time in your network looking for these people and their access credentials.

Similarly, storing backups in the cloud also needs to be done with care – in one incident Sophos Rapid Response investigated, the attackers emailed the cloud service provider from a hacked IT admin account and asked them to delete all backups. The provider complied.

The standard formula for secure backups that can be used to restore data and systems after a ransomware attack is 3:2:1: three copies of everything, using two different systems, one of which is offline.

One final note of caution, having offline backups in place won’t protect your information from extortion-based ransomware attacks, where the criminals steal and threaten to publish your data instead of or as well as encrypting it.

Misperception 7: Our employees understand security.

Sophos Counterpoint: According to the State of Ransomware Survey 2021, 22% of organisations believe they’ll be hit by ransomware in the next 12 months because it’s hard to stop end-users from compromising security.

Social engineering tactics like phishing emails are becoming harder to spot. Messages are often handcrafted, accurately written, persuasive and carefully targeted. Your employees need to know how to spot suspicious messages and what to do when they receive one. Who do they notify so that other employees can be put on alert?

Misperception 8: Incident response teams can recover my data after a ransomware attack.

Sophos Counterpoint: This is very unlikely. Attackers today make far fewer mistakes and the encryption process has improved, so relying on responders to find a loophole that can undo the damage is extremely rare. Automatic backups like Windows Volume ShadowCopies are also deleted by most modern ransomware as well as overwriting the original data stored on disk making recovery impossible other than paying the ransom.

Misperception 9: Paying the ransom will get our data back after a ransomware attack.

Sophos Counterpoint: According to the State of Ransomware Survey 2021, an organisation that pays the ransom recovers on average around two-thirds (65%) of its data. A mere 8% got back all of their data and 29% recovered less than half. Paying the ransom – even when it seems the easier option and/or is covered by your cyber-insurance policy – is therefore not a straightforward solution to getting back on your feet.

Further, restoring data is only part of the recovery process – in most cases the ransomware completely disables the computers and the software and systems need to be rebuilt from the ground up before the data can be restored. The 2021 survey found that recovery costs are, on average, 10 times the size of the ransom demand.

Misperception 10: The release of ransomware is the whole attack – if we survive that we’re OK.

Sophos Counterpoint: Unfortunately, this is rarely the case. The ransomware is just the point at which the attackers want you to realise they are there and what they have done.

The adversaries are likely to have been in your network for days, if not weeks, before releasing the ransomware, exploring, disabling or deleting backups, finding the machines with high value information or applications to target for encryption, removing information and installing additional payloads such as backdoors. Maintaining a presence in the victim’s networks allows attackers to launch a second attack if they want to.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.