Bot myths leave businesses at higher risk

Netacea, the bot detection and mitigation specialist, announced results from a new report showing that most businesses do not fully understand the threat bots pose, leaving those organisations vulnerable to threats.

The report, The Bot Management Review: Separating Bot Fact from Fictionsurveyed 440 businesses across the travel, entertainment, eCommerce, financial services, and telecoms sectors in the US and the UK. The report found that while most businesses were aware that bots were an issue, many were confused about where attacks originate and what technologies and techniques were effective against bots.

For example, the report shows that more than two-thirds of businesses believe that WAFs (Web Application Firewalls) and DDoS (Distributed Denial of Service) protection keep them secure from bot attacks. While these tools will prevent some attacks, they are not effective against bots—leaving businesses vulnerable to attacks that may mean the difference between profit and loss.

Previous research from Netacea found that bots damage businesses both directly and indirectly. Bot traffic costs businesses millions, whether bots are scraping content, buying goods before anyone else or using stolen passwords to take over accounts. However, while businesses understand that this threat exists, this does not mean they understand how to fight it.

The top 5 myths businesses believe about bots are:

MYTH: WAFs will stop sophisticated bots (believed by 73%, including 92% of telcos and 77% of eCommerce businesses).

FACT: WAFs are not designed to stop bot threats, though basic bot mitigation tools may be bundled with this service.

MYTH: DDoS protection will stop all bot attacks (believed by 71%).

FACT: While DDoS protection will help keep websites online when overwhelmed by traffic from a botnet, this type of activity is very different from a bot attack.

MYTH: Bot attacks only come from Russia and China (believed by 61%).FACT: Netacea’s research has found that just over a third of businesses have detected threats from Russia and China. Meanwhile, around half of businesses detected threats from the US and the UK, and many more have been detected from throughout Europe.

MYTH: All bots are bought on the dark web (believed by 58%).FACT: Increasingly we see not just bots but data dumps of usernames and passwords made available on the “clear web” and accessible to anyone.

MYTH: All bot users are criminals (believed by 55%).FACT: While bot techniques such as card cracking and account takeover are illegal, many everyday consumers are able to get their hands on “grinch bots” and buy limited edition products faster than any human.

“The first step to preventing any attack is to understand it, otherwise you’re flying blind. In the case of bots, if security teams cannot identify the nature of an attack and are deploying the wrong solutions, they are leaving themselves open to attack,” said Andy Still, CTO, Netacea. “Bots are growing in sophistication and popularity among both professional and amateur hackers. Only with a better understanding of what bots are capable of and what tools and techniques are effective against them will security teams be better prepared for the threat bots pose to their businesses.”

To read more exclusive features and latest news please see our Q1 issue here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Riham Security website

Growing Intersec Saudi Arabia

Intersec Saudi Arabia’s Event Director, Riham Sedik, discusses the event’s future growth and government partnerships
Dr Ilia Kolochenko, Partner and Cybersecurity Practice Lead, Platt Law LLP

Big Interview: Dr. Ilia Kolochenko, ImmuniWeb

Dr. Ilia Kolochenko, Chief Architect, ImmuniWeb and cybersecurity influencer, talks about the proposed mandatory reporting of ransomware..
Tenable

The Innovator – Tenable

Gavin Millard, Deputy CTO and VP of Market Insights at Tenable talks through one of the biggest security threats to businesses…

Neustar Security Services introduces UltraPlatform

Neustar Security Services, a provider of cloud-based security services that enable businesses to thrive online, is launching UltraPlatform.

Security and fire 2023 trends

In 2023 all industries will face several challenges: sustainability, cost increases, and how to better manage energy & resources.
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise..
Scroll to Top