Connect with us

Cyber Security

Cohesity Research Highlights a Gap That Puts Businesses and Security Postures at Risk

Published

on

New research commissioned by Cohesity reveals that while most IT and security operations (SecOps) decision-makers believe they should jointly share the responsibility for their organization’s data security strategy, many of these teams are not collaborating as effectively as possible to address growing cyber threats. The survey also shows that of those respondents who believe collaboration is weak between IT and security, nearly half of respondents believe their organization is more exposed to cyber threats as a result — and the implications of that could have significant consequences for businesses.

The research is based on an April 2022 survey conducted by Censuswide, of more than 2,000 IT decision-makers and SecOps professionals (split nearly 50/50 between the two groups) from businesses in the United States, the United Kingdom, and Australia — all of whom have a role in the decision-making process for IT or security. The survey was conducted as nearly three-quarters (74%) of respondents believe the threat of ransomware in their industry has increased over the last year, with nearly half of respondents (47%) saying their organization has been the victim of a ransomware attack in the last six months. The survey uncovered the following results globally:

  • Security should be a shared responsibility: More than four in five (81%) of respondents overall (86% of IT decision-makers and 76% of SecOps) somewhat or strongly agree that IT and SecOps should share the responsibility for their organization’s data security strategy.
  • But, effective collaboration between IT and security teams is frequently not happening: Almost a third of SecOps respondents (31%) believe the collaboration is not strong with IT, with 9% of those respondents going so far as to call it “weak.” Among IT decision-makers, more than a tenth of respondents (13%), believe collaboration with SecOps is not strong. In total, nearly a quarter (22%) of IT and SecOps respondents overall believe the collaboration between the two groups is not strong.[1]
  • In many cases, even though the threat of cyber attacks has increased, the level of collaboration between IT and SecOps has remained stagnant or has declined: 40% of respondents, overall, said collaboration between the two groups has remained the same even in light of increased cyber attacks. And, 12% of all respondents said collaboration has actually decreased. While only 5% of IT decision makers said collaboration has decreased, nearly one in five (18%) of SecOps respondents believe that is the case, highlighting disparity between the two functions.
  • The ongoing tech talent shortage is making matters worse: When asked if the talent shortage is impacting the collaboration between IT and security teams, 78% of respondents (77% of IT decision-makers and 78% of SecOps) said, yes, it is having an impact.
  • As a result of this lack of collaboration between IT and SecOps, many respondents believe their organization is more exposed: Among the IT and SecOps respondents who believe the collaboration is weak between the two groups, 42% believe their organization is either more exposed (28%), or much more exposed (14%) to cyber threats.
  • The consequences of that exposure could be devastating for businesses and for careers: When asked what would be their worst fear about a lack of collaboration between security and IT if an attack takes place, 42% of all respondents are concerned about a loss of data, 42% fear business disruption, 40% are worried customers will take their business elsewhere, 35% fear finger-pointing will take place and their team will be blamed should any mistakes occur, 32% are worried about paying ransomware, and 30% fear people from both teams (IT and SecOps) will be fired.

“This research pinpoints there is often a lack of collaboration between IT and security teams that we’re seeing across many organizations today,” said Brian Spanswick, chief information security officer, Cohesity. “For too long, many security teams focused primarily on preventing cyber attacks, while IT teams have focused on data protection, including backup and recovery. A complete data security strategy must bring these two worlds together — but in many cases, they remain separate and this lack of collaboration creates significant business risks and can put companies at the mercy of bad actors.”

To further drive this point home, when respondents were asked how their company prioritized data backup and protection as part of their organization’s security posture or response to a cyber attack, 54% of IT decision-makers said it was a top priority and a crucial capability, while only 38% of SecOps respondents said the same. “If SecOps teams are not thinking about backup and recovery, and lack next-gen data management capabilities as part of an overall security strategy, that’s a problem,” said Spanswick. “IT and SecOps teams need to collaborate before an attack takes place — looking holistically across the NIST Cyber Security Framework which includes five core capabilities: identify, protect, detect, respond, and recover. If they wait to collaborate until their data is hijacked, that’s too late and the results could be catastrophic for businesses.”

Eighty-three percent of all respondents (84% of IT decision-makers and 81% of SecOps respondents) somewhat or strongly agree that if security and IT collaborated more closely, their organization would be better prepared to recover from cyber threats including ransomware attacks. And, when respondents were asked what would give their organization greater confidence that they could recover business systems quickly in the event of a ransomware attack, 44% of all respondents (49% of IT decision-makers and 39% of SecOps respondents) said greater communication and collaboration between IT and security is key.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published.

Cyber Security

Group-IB Unveils Unified Risk Platform

Published

on

Group-IB has today unveiled the Unified Risk Platform, an ecosystem of solutions that understands each organization’s threat profile and tailors defenses against them in real-time. Every product and service in Group-IB’s now consolidated security suite is enriched with information from a Single Data Lake, which contains 60 types of sources of adversary intelligence. The Unified Risk Platform automatically configures your Group-IB defenses with the precise insights needed to provide the best possible defense against targeted attacks on the infrastructure and endpoints, breaches, fraud, brand, and IP abuse.

“At the heart of the Unified Risk Platform is a Single Data Lake that has the most complete and detailed insight into threat actors. Group-IB has collected the industry’s broadest range of adversary intelligence, with 60 types of sources across 15 categories,” the company said in a statement.

The data is gathered by and exclusive to Group-IB, providing customers with unprecedented visibility of threat actors’ operations. The raw data is enriched with context, converted into actionable intelligence, and added to Group-IB’s Single Data Lake. The patented technology is continuously refined by state-of-the-art research, science, and modeling conducted by Group-IB’s dedicated analyst teams spanning 11 cybersecurity disciplines.

The modular architecture of the Unified Risk Platform allows additional capabilities to be easily activated, providing increased protection from cybercrime without friction. A range of out-of-the-box integrations and flexible APIs enable the Unified Risk Platform to easily enhance any existing security ecosystem. When organisations need specialist support, Group-IB’s comprehensive suite of services is available for any purpose, from one-off red teaming exercises or incident response to in-life managed detection and response.

In addition to the services, every Group-IB product is powered by the platform to provide complete coverage of the Cyber Response Chain:

  • Group-IB Threat Intelligence provides deep insight into adversary behaviors. Threat Intelligence was independently evaluated as creating a 10% increase in team efficiency over alternative vendors and in a case study generated a 339% return on investment.
  • Group-IB Managed XDR enables organizations to respond 20% faster to threats according to an analyst study.
  • Group-IB Digital Risk Protection allows organizations to reduce the risk of brand abuse, piracy, data leaks, and more with best-in-breed protection. Group-IB has been benchmarked as detecting pirated content in 30 min on average and taking down 80% of the content within 7 days.
  • Fraud Protection was calculated by consultants to reduce the rate of false-positive fraud cases by 20% and enable 10% to 20% more fraud attempts to be detected and prevented. Furthermore, Group-IB identified 30% more one-time password fraud.
  • Attack Surface Management continuously discovers external assets to identify shadow IT, forgotten infrastructure, misconfigurations, and other hidden risks. As part of the Unified Risk Platform, the solution provides a threat actor’s view of the attack surface so that weak spots can be quickly and proactively strengthened.
  • Business Email Protection defends corporate email from sophisticated attacks. The solution monitors for indicators of compromise identifies malicious behavioral markers and extracts artifacts to identify risky emails before they reach their destination.
Continue Reading

Cyber Security

Genetec Announces Availability of its Synergis Cloud Link PoE-Enabled IoT Gateway

Published

on

Genetec has announced the immediate availability of a new generation of its Synergis Cloud Link PoE-enabled IoT gateway for access control. Manufactured in North America to mitigate supply chain delays, Synergis Cloud Link addresses the increasing demand for non-proprietary access control solutions and provides a safe and secure gateway to a cloud or hybrid deployment.

“When modernizing an existing security system, Synergis Cloud Link’s open architecture allows organizations to leverage their current access control infrastructure and easily upgrade to a secure IP-based solution. Synergis Cloud Link provides a more efficient approach to multi-site deployments and replaces the need for servers, reducing the cost of ownership.  The Synergis Cloud Link IoT gateway has embedded functionalities that keep an organization’s access control running even when the connection to the server is down,” the company said in a statement.

“The new generation of Synergis Cloud Link provides more features, enhanced cybersecurity, and helps future-proof security installations. Synergis Cloud Link features enhanced cybersecurity such as encrypted user data, Secure Boot, and an EAL6+ industry gold standard Secure Element that stores cryptographic elements,” the company added.

“The need for non-proprietary access control solutions has never been greater,” said Thibault Louvet, Access Control Product Group Director, Genetec Inc. “Our new generation Synergis Cloud Link enables us to provide organizations with a powerful, secure, and intelligent gateway to the latest technology while allowing them to easily connect to hybrid or cloud access control environments and keep their existing security investment including hardware, wiring, and infrastructure.”

The device is compatible with non-proprietary access control modules from the industry’s most established manufacturers including HID Global, Axis Communications, ASSA ABLOY, Mercury Security, Allegion, SimonsVoss, STid, and others. A single Synergis Cloud Link device can support up to 256 readers and electronic locks, 600,000 cardholders, 150,000 offline events, as well as monitor hundreds of zones and alarms.

Synergis Cloud Link features a new firmware design, improving reliability and lifecycle management, and updates management. It also opens the door to containerized approach for operating software on the device, expanding its future capabilities.

Continue Reading

Cyber Security

Surge in Ransomware Attacks Has Made Effective Cyber Security and Defence a Top Priority

Published

on

Emad Fahmy, the Systems Engineering Manager for Middle East at NETSCOUT, speaks about the evolving threat landscape in the region

How has the security threat landscape evolved in recent months?
According to a 2021 survey by PwC, cybersecurity is a growing concern for organizations, with approximately 43% of Middle East CEOs planning to increase investments in cybersecurity and data privacy by 10% or more over the next three years. Moreover, 41% of these leaders think that their organization should be doing more to measure cybersecurity. The ever-evolving threat environment has made it increasingly necessary to be vigilant.

Cybercrimes continue to grow in terms of both complexity and frequency. Among the businesses that identify breaches or attacks, 21% lose money, data, or other assets, and 35% report being negatively impacted in other ways and suffering from wider business disruption. As such, it’s vital for enterprises to ensure the security of data, applications, networks, and critical business processes to stay competitive and thwart attackers. Depending on traditional security solutions and methodologies isn’t enough to combat the sophisticated attacks that target businesses today.

Is ransomware still an issue?
It is, unfortunately. The unprecedented surge in ransomware attacks has made effective cyber security and defence a top priority in today’s world. Every day, new ransomware attacks are reported by businesses and government authorities alike, not to mention the attacks that go unreported, and it seems like no one is immune.

Threat intelligence is vital to combat ransomware attacks. Threat intelligence is the study of the bad actors who perpetrate these attacks, along with the tactics and tools they use. This involves unveiling the bad actor’s attack methodologies and why they are targeting those victims. This knowledge is then turned into actionable insight that enterprises can access and comprehend. Empowered with this knowledge, enterprises can learn about their network’s vulnerabilities to actively defend against ransomware.

Companies have been trying to protect the endpoint for years. How can companies make sure endpoints are protected and monitored for attacks and mitigation?
As service providers increasingly focus on cloud services, edge computing, end-users, and endpoint devices, the traditional approach of utilizing distributed detection solutions in concert with centralized mitigation centres within the network is no longer enough. However, mitigation measures that are distributed out to the network edge necessitate both infrastructure and intelligent defence capabilities that are capable of working hand in hand across locations and platforms.

A more modern threat mitigation strategy involves distributing both detection and mitigation functions throughout the network to intercept threats nearer to the source. In this way, network operators can stop attacks upstream, instead of having to incur the cost of peering and transit link traffic that is only going to be discarded once it reaches a centralized scrubbing centre. By conducting the scrubbing as close as possible to the threat source, service providers can reduce any potential impact on traffic, helping to ensure high-quality service.

Continue Reading
Advertisement


Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.