Companies Are Ill-Prepared for Cyber-Attacks

 
 
By Karen A. Frenkel  |  Posted 01-31-2017 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Companies Are Ill-Prepared for Cyber-Attacks
    Next

    Companies Are Ill-Prepared for Cyber-Attacks

    Most organizations are not prepared to deal with cyber-attacks and insider sabotage, and some are concerned about security when migrating to the cloud.
  • Previous
    Top Cyber-Threats
    Next

    Top Cyber-Threats

    Outsider attack: 43%, Data vulnerability: 38%, Insider sabotage: 35%, User errors: 35%, Phishing: 35%
  • Previous
    Security Concerns About the Cloud
    Next

    Security Concerns About the Cloud

    Security of data in transit: 66%, Security of data at rest: 60%, Security of backups and snapshots: 54%, Increased attack surface: 53%
  • Previous
    Secondary Cloud Security Issues
    Next

    Secondary Cloud Security Issues

    Lack of visibility: 51%, Lack of policies: 41%, Access from unauthorized devices: 34%
  • Previous
    Job Concerns
    Next

    Job Concerns

    66% of the IT decision-makers surveyed worry that they will lose their jobs because of security issues.
  • Previous
    Concerns About Monitoring the Cloud
    Next

    Concerns About Monitoring the Cloud

    47% of IT professionals are unable to monitor workloads across clouds. 44% agree, or strongly agree, that there is insufficient network control and monitoring in the cloud.
  • Previous
    Managing Security of Hybrid Clouds
    Next

    Managing Security of Hybrid Clouds

    Seven out of 10 IT decision-makers said they are concerned, or completely concerned, about managing the security of hybrid infrastructures.
  • Previous
    Worry About Financial Compensation
    Next

    Worry About Financial Compensation

    73% of respondents worry about the financial compensation their company might have to pay as a result of a security breach.
  • Previous
    New Technologies Can Help
    Next

    New Technologies Can Help

    Because the cloud and hybrid infrastructure adoption pose unknown security challenges, CIOs must prevent zero-day exploits, advanced persistent threats (APTs), and other cyber-crimes by adopting breakthrough technologies.
  • Previous
    Analyze Your Data
    Next

    Analyze Your Data

    When opting for a hybrid cloud solution, perform an analysis of the type of data your organization handles and evaluate it based on its sensitivity.
  • Previous
    What to Keep In-House
    Next

    What to Keep In-House

    Store critical, personal and private data related to intellectual property in-house, and only give access to authorized personnel.
  • Previous
    Use Many Authentication Mechanisms
    Next

    Use Many Authentication Mechanisms

    All types of data access should be done via multiple authentication mechanisms. These should involve more than just user names and passwords. Two-factor or biometric data can offer additional safeguards.
 

A recent survey reveals that most organizations are not prepared for outsider attacks, data vulnerability, insider sabotage, user errors and phishing. It also explores security concerns when migrating to the cloud and reports that IT-decision-makers fear for their jobs. The report, "Virtualization Brings New Security Challenges for Large Companies," was based on a survey conducted by iSense Solutions and sponsored by security technology company Bitdefender. Approximately 250 security professionals (including CIOs and CISOs) participated. Of them, 26 percent are IT managers or directors, 50 percent are IT systems administrators, 10 percent are IT support specialists, and the rest work in other areas of the company. "To limit the risk of insider sabotage and user errors, companies must establish strong policies and protocols and restrict the ways employees use equipment and infrastructure or privileges inside the company network," said Bitdefender's Bogdan Botezatu, senior e-threat specialist. "The IT department must create policies for proper usage of the equipment, and ensure they are implemented." Here are some key findings of the report.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register