官方社群在线客服官方频道防骗查询货币工具

Survey: Cybersecurity requires risk-based management approach

2024年08月14日 08:25:06
news.like.tgnews.like.tgnews.like.tgnews.like.tg

LIKE.TG | 发现全球营销软件&服务汇聚顶尖互联网营销和AI营销产品,提供一站式出海营销解决方案。唯一官网:www.like.tg

We’ve entered a new era of cyber risk where cybersecurity is no longer just an IT issue, according to findings from a May 2022 ThoughtLab global survey co-sponsored by ServiceNow. Although cyberattacks and breaches are increasing, many organizations are unprepared to respond.

The problems come down to three main areas:

  1. Extended attack surface through partners and suppliers
  2. Cyber risk initiatives not up to date with digital transformation
  3. Budget constraints

Denial of service and phishing attacks account for the lion’s share of cyberthreats today, at 49% and 46% of attacks, respectively. In the next two years, phishing attacks will continue to be a problem, posing the highest risk for 50% of the 1,200 worldwide organizations surveyed across 14 industries. But denial of service will be less of a threat (31%) in the subsequent 24 months, surpassed by human error (44%) and ransomware (40%).

The cybersecurity landscape

To counter these attacks, organizations should harden their systems to prevent cybercriminals from ever breaching them. This requires detailed attention to IT infrastructure and platforms. Although human error is the main cause of today’s largest breaches, misconfigurations will pose the biggest risk over the the next two years, according to the survey.

“Misconfigurations across applications, systems, platforms, and servers—and neglecting to put new default settings in place—can create dangerous pathways for hackers,” the report notes.

Organizations know they need stronger security, but budget constraints prevent them from investing in cybersecurity technologies. Businesses also struggle with identifying key risks and detecting and responding to incidents.

Despite these challenges, many organizations have succeeded in establishing governance and risk assessment. And more than half of the respondents surveyed have invested in protective technology (55%) and data security (52%). Where organizations come up short is in awareness and training. Investments in this area could help curb breaches due to human error.

Bolstering security

Nearly 60% of organizations have successfully implemented cyberthreat detection processes. Yet, it takes an average 128 days to detect a breach, according to the study. To ramp up security initiatives, organizations need to move from the detection phase to continuous monitoring.

Beyond that, the best way forward is through a risk-based approach involving:

  • Regular risk assessment
  • Advanced analysis
  • Enterprise-wide risk management
  • Proactive risk mitigation

"Risk-based management aligns security priorities with the business and helps security leaders become more strategic in their views and outcomes,” explains Barbara Kay, senior director of product marketing, risk, security, and ESG at ServiceNow.

Nearly half (43%) of surveyed organizations have adopted a risk-based approach to date.

Gain more insights in the ThoughtLab report, including 10 best practices to boost your cybersecurity performance.

LIKE.TG汇集全球营销软件&服务,助力出海企业营销增长。提供最新的“私域营销获客”“跨境电商”“全球客服”“金融支持”“web3”等一手资讯新闻。

点击【联系客服】 🎁 免费领 1G 住宅代理IP/proxy, 即刻体验 WhatsApp、LINE、Telegram、Twitter、ZALO、Instagram、signal等获客系统,社媒账号购买 & 粉丝引流自助服务或关注【LIKE.TG出海指南频道】【LIKE.TG生态链-全球资源互联社区】连接全球出海营销资源。

本文由LIKE.TG编辑部转载自互联网并编辑,如有侵权影响,请联系官方客服,将为您妥善处理。

This article is republished from public internet and edited by the LIKE.TG editorial department. If there is any infringement, please contact our official customer service for proper handling.


效率工具客服坐席客服系统坐席多开
加入like.tg生态圈,即可获利、结识全球供应商、拥抱全球软件生态圈加入like.tg平台,即可获利、结识全球供应商、拥抱全球营销软件生态圈加入like.tg生态资源圈,即可获利、结识全球供应商、拥抱全球软件生态圈
营销拓客
加入like.tg生态圈,即可获利、结识全球供应商、拥抱全球软件生态圈加入like.tg平台,即可获利、结识全球供应商、拥抱全球营销软件生态圈加入like.tg生态资源圈,即可获利、结识全球供应商、拥抱全球软件生态圈