Whilst organisations are spending more budget on securing their IT, there is still the human element which cannot be ignored. The ICO UKs Q2 2018/19 figures show that out of 675 cyber incidents reported, 367 were phishing attacks - that’s 54%.
When you mention cyber security, thoughts generally focus on perimeter security; breach prevention, firewalls, email protection, anti-malware software, anti-spam, anti-phishing – all primarily preventative technologies.
Data reported by Symantec CloudSOC in ETCIO.com found that enterprises on average use up to 1,000 cloud apps. However, most CIOs think their organisations only use around 30 or 40 cloud apps. In fact, the average number of apps adopted by enterprises is 928 leaving an awful lot untracked by CIOs.
In a world of predators, you need to master your survival skills. No one implementing cutting-edge cloud technology can afford to ignore security. It is the main barrier to cloud adoption. Already, 27% of IT security budgets are allocated to cloud security and this is estimated to reach 37% in the next 12 months.
What is Privileged Access Management and why it’s growing at 32% CAGR
Privileged Access Management refers to a class of solutions that help secure, control, manage and monitor privileged access to critical systems. A privileged user has administrative access to these critical assets.
Zinopy is sponsoring this year’s HEAnet conference being held from 7 - 9 November in the Galmont Hotel in Galway (you might know it as the Radisson). With 26 exhibitors (sold out) and around 500 attendees, HEAnet attracts delegates from across the Education and Research Sector, as well as industry leaders and technology experts.
One year ago this past weekend the world was rocked by WannaCry, the biggest ever ransomware of its kind, which spread like wildfire around the world infecting hundreds of thousands of computers in over 150 countries within hours, encrypting data and demanding ransom to be paid via bitcoin. It essentially took Ireland’s Health Service Executive computer systems off the internet for nearly a week, as they worked to patch unpatched systems.
The vast majority of IT security budgets are allocated to preventing security breaches. However, Gartner predicts that by 2020, 60% of enterprises' information security budgets will be allocated for rapid detection and response approaches, up from less than 10% in 2014.
Cyber-attacks are evolving at an alarming rate and affect everyone and anyone. With the current threat landscape at its highest, how can we aim to keep ourselves and our customers cyber secure?
Knowledge is power and understanding your organisation’s security posture, although no trivial task, is a crucial starting point for any business serious about protecting from cyber attacks and potential security breaches.