Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

New Mindset Needed To Take On Cybersecurity Complexities, New CompTIA Report Says

New thinking on cybersecurity policies, processes, people and products are necessary for organizations to reverse perceptions, and perhaps realities, that they are falling behind in their preparedness, a new report from CompTIA, the nonprofit association for the information technology (IT) industry and workforce, asserts.

Recommended AI News: Adsonica Audio Display Ads Available On Envisionwise Platform

CompTIA “2021 State of Cybersecurity” report, based on a recent survey of business and IT professionals in the United States, examines current cybersecurity strategies and outlines the tactics needed to elevate a cybersecurity presence to meet today’s threats.

“Complexity is the common theme across the cybersecurity landscape,” said Seth Robinson, senior director for technology analysis at CompTIA. “As a result, organizations must approach cybersecurity with a completely different mindset. Practices considered good enough in the recent past are no longer sufficient.”

Three in 10 survey respondents said they are “completely satisfied” with their organization’s approach to cybersecurity, while 27% feel the general state of cybersecurity is “improving dramatically.”

The cybersecurity issues organizations must consider are complex and numerous. Top of mind for companies are the volume and variety of attacks, cited by 49% and 43% of respondents, respectively. Privacy concerns (40%), greater reliance on data (38%) and quantifying security issues (34%) are other factors companies must account for when developing cybersecurity policies, implementing new practices and making investments.

Related Posts
1 of 40,576

The emerging new mindset on cybersecurity has as its foundation the concept of zero trust. Rather than assuming that network traffic or user access is harmless due to origin or credentials, zero trust requires verification at every step. The report acknowledges that a shift to a zero-trust policy is likely to be a more expensive than other approaches. Among companies in CompTIA’s survey currently pursuing a zero-trust architecture, 75% have found that more investment is required for zero trust than for their previous cybersecurity initiatives.

Processes to implement the cybersecurity policy are the next step. Security monitoring (49%), workforce assessments and education (41%) and threat intelligence (41%) are among the processes most often used today. While most companies focus their monitoring on traditional cyber threats such as viruses and malware, there is interest in improving knowledge around phishing, ransomware, firmware hacking, IP spoofing and other new types of attacks.

Recommended AI News: Syniti Announces Investment Strategy To Support Data Management For Intelligent Enterprises

While supply chain attacks have grabbed recent headlines ransomware continues to be a powerful threat, with the average cost of remediating a ransomware attack estimated at $1.85 million.1

The use of workforce assessments and education is a reminder that the weakest link in cybersecurity continues to be humans. While not every employee requires the same level of cybersecurity knowledge and training, companies are keenly aware that skills must be kept current and relevant. Approximately four out of ten companies feel that they need significant improvement in skill levels.

Complexity also extends to the toolbox of cybersecurity products available to organizations. Antivirus software (54%) and firewalls (52%) remain the most commonly deployed solutions, with both becoming more robust in the protections they provide. Other products that are getting a closer look are password managers (44%), identity and access management tools (43%) and security information and event management solutions (41%).

Recommended AI News: Cohesity Appoints Kevin Delane as Chief Revenue Officer

[To share your insights with us, please write to sghosh@martechseries.com ]

Comments are closed.