Connect with us

Hi, what are you looking for?

HEADLINES

Regular changes to cybersecurity measures essential as data breaches are ‘inevitable’

Artwork by Janis Dei Abad

A new report shows there is a strong consensus among security professionals and experts that “perimeter defense is no longer a sufficient information security strategy.”

Nearly three-quarters (73%) of respondents said their cybersecurity needs had changed in the past 12 months and 69% said they expected them to change again in the next year. As a result, 27% of respondents said they formally reassessed their cybersecurity needs quarterly, and a further 31% did so annually.

The report, released by Ari Kaplan Advisors, found that information security officers and data custodians would need to share responsibility for “knowing where different pieces of sensitive information were kept and ensuring that they were stored securely.” This required partnering with “eDiscovery, in-house counsel, records management, and information governance.”

Such collaboration was a daily event for 23% of survey participants, and at least monthly for 54%.

Advertisement. Scroll to continue reading.

The increasing use of mobile and personal devices to access corporate systems have “expanded the perimeter beyond what any corporate can control, introducing threats that you cannot fully monitor,” one respondent explained. But while 96% of respondents said their companies allowed remote access to systems, only 69% had formal “bring your own device” policies; the remainder allowing such activity to go unmanaged.

Respondents also reported needing to balance these new security challenges with business needs to “enhance productivity, promote workplace flexibility, and improve the customer experience.”

“This report confirms and clarifies what we’ve been hearing in the marketplace, that information security is undergoing a profound change and entering a new phase,” said Dr. Jim Kent, Nuix’s Global Head of Investigations and Cybersecurity. “We’ll be very interested to see how this transformation works its way through the business community as we repeat this benchmarking survey next year and into the future.”

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

Advertisement