Story image

Most organisations unconfident in ability to protect data after breach

14 Jun 16

The majority of IT professionals say they are not confident in their ability to keep their organization’s data secure following a breach, a Gemalto study has found.

At a time when one-third of organisations have experienced a data breach in the last 12 months, and more than 3.9 billion data records have been lost or stolen since 2013, the report’s findings will be a cause for some concern.

In a survey of 1,100 IT decision makers around the world, 61% said their perimeter security systems – including firewall, AV and content filtering – were “very effective” at keeping unauthorised users out of their network. However, 69% said they are not confident their organization’s data would be secure if their perimeter security was breached.

Worryingly, as many as 66% of IT professionals say that unauthorised users can access their networks, and 16% believe unauthorised users have access to their entire networks.

“This research shows that there is indeed a big divide between perception and reality when it comes to the effectiveness of perimeter security,” said Jason Hart, vice president and chief technology officer for data protection at Gemalto.

“The days of breach prevention are over, yet many IT organisations continue to rely on perimeter security as the foundation of their security strategies. The new reality is that IT professionals need to shift their mindset from breach prevention to breach acceptance and focus more on securing the breach by protecting the data itself and the users accessing the data.”

The heavy reliance on perimeter security systems also neglects the possibility of data leaks occurring from inside an organisation.

One recent survey suggested that the greatest threat posed to a business’ cybersecurity program are employees. This 2015 paper, by Nuix, reported that the overwhelming majority of respondents (93%) consider “human behavior” to be the number one threat to their security.

“While protecting the perimeter is important, organisations need to come to the realisation that they need a layered approach to security in the event the perimeter is breached,” concluded Mr. Hart for Gemalto.

“By employing tools such as end-to-end encryption and two-factor authentication across the network and the cloud, they can protect the whole organisation and, most importantly, the data.”

Article by Narinder Purba, senior editor, welivesecurity.

SonicWall secures hybrid clouds by simplifying firewall deployment
Once new products are brought online in remote locations, administrators can manage local and distributed networks.
What MSPs can learn from Datto’s Channel Ransomware Report
While there have been less high profile attacks making the headlines, the frequency of attacks is, in fact, increasing.
Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”