Inside Security : Top 10 cybersecurity challenges facing organisations?
How are companies measuring up in the realm of security as business becomes increasingly digital?
In this digital era, a cybersecurity attack can come from anywhere. Security should be at the top of every organisation’s agenda unless they want to be caught on their blindside. Last year, Dimension Data partnered with C-View Technologies to launch a cybersecurity self-diagnosis tool. Cybersecurity self-assesment helps organisations evaluate their existing cybersecurity against industry benchmarks.
Based on an anonymous aggregation of responses, here are the top 10 cybersecurity challenges facing companies today:
- USB encryption
Almost half the respondents were lacking when it came to USB encryption. They failed to ensure that data from a device connecting to end points via USB was sufficiently encrypted, were it to end up in an unsecured or hostile environment.
- Third party device connectivity
Some 35% of organisations aren’t controlling end point connectivity solutions like SD cards, Bluetooth, and FireWire, to limit the threats they potentially bring.
- USB control
USB devices can be a significant vector for the distribution of cyberattacks. However, over 35% of respondents don’t control or limit any device connecting to end points via USB.
- Data loss prevention
- Reverse engineering of malware
Only 39% of organisations are actively working on reverse engineering of malware, while 32% are still in an initial phase of developing this.
- Emergency response team
Only 16% of assessments showed a fully capable emergency response team, while 51% of companies would be able to put together an emergency response team and are somewhat prepared to respond to a potential breach. However, 32% of organisations would fall short in responding, cleaning up, and analysing a cyberattack.
- Breach indicators
Reporting systems, log managers, security information, and event management (SIEM) systems automatically raise the alarm when indicators reach a point which is deemed unacceptable, reducing the potential impact to the network. Only 38% of organisations are actively monitoring their breach indicators, while 41% have only average capabilities of monitoring and interpreting these. Less than 20% are unable to clearly identify breach indicators as they occur.
- Disk encryption
Full disk encryption protects against data theft and loss, especially in the case of a machine or device being removed from a secure environment. The responses show that less than 30% of organisations are enforcing disk encryption.
- Application control
Less than half the respondents said their organisations are running an active application control programme, with 25% not actively controlling or limiting the applications within their network. Some 27% are enforcing some application control policies.
- Mobile device management (MDM)
Although 26% of companies haven’t yet started to address the fact that mobile devices need to be protected to the same level as laptops or desktops, over half the organisations are actively running MDMt, while 22% have already started to enforce some MDM policies within their organisations.
These results show that an encouraging proportion of companies are actively deploying protection, but most don’t feel fully prepared and are focused on further optimisation. None felt completely unprepared but all acknowledged a greater need for enhanced security.
What is your cybersecurity posture? Take the test! It only takes five minutes, and a Dimension Data consultant will contact you to share your bespoke detailed executive report.