With the rushed implementation and rapid increase in device creation, businesses are opening themselves up to an exponentially greater number of vulnerabilities.
With the introduction of new business innovations like cloud computing, bring-your-own-device, social media and big data, companies have rushed to access their benefits by adopting new technologies. But with hasty implementation and a rapid increase in device creation, businesses are opening themselves up to an exponentially greater number of vulnerabilities.
Cisco’s 2014 Midyear Security Report found that 94 percent of their customers’ networks werehosting traffic that led to sites infected with malware, and cybercriminals are finding it increasingly easy to exploit inherent vulnerabilities in hastily deployed systems. The pharmaceutical and chemical industry was found to be in the top three sectors most at risk for encountering malware, and the media and publishing fields were also showing rates of malware infection that were much higher than normal.
As cybercrime and high-profile data breaches grow in size every day, companies are beginning to realize the need to change the way they view their approach to cybersecurity.
“Businesses are beginning to understand that security is not just a thing or a product that can be bought and installed, but a continuous process at the heart of their companies,” wrote IBM’s Marc van Zadelhoff in an piece for Forbes. “This new era of computing requires a new approach to security.”
According to a recent study conducted by the Ponemon Institute, an average data breach will cost an organization $6 million. But while 61 percent of respondents said they viewed cybercrime as one of the greatest threats to their reputation, only half felt confident in their company’s security posture.
New tools changing the security landscape
Organizations interested in protecting their sensitive information can use those same innovative technologies they rushed to implement to fight against growing vulnerabilities. Big data analytics are an incredible resource for identifying threats to systems as security information can be collected from endpoints across a network. The intelligence can then be analyzed and any apparent risks can be detected and patched. Big data security intelligence technologies are also available that analyze systems in real time to identify anomalous behavior and prevent fraud.
It is also important for enterprises to constantly monitor networks to see who is accessing information and from what endpoint. Real-time coverage of system activity is vital for creating a response plan that will mitigate the effects of a cyberattack. With security information and event management, companies are able to create a breach policy that combines the appropriate tools, information and skills to fight against data theft.