Skip to main content

Cybersecurity Challenges

  1. USB encryption
Almost half the respondents were lacking when it came to USB encryption. They failed to ensure that data from a device connecting to end points via USB was sufficiently encrypted, were it to end up in an unsecured or hostile environment.
  1. Third party device connectivity
Some 35% of organizations aren’t controlling end point connectivity solutions like SD cards, Bluetooth, and Fire Wire, to limit the threats they potentially bring.
  1. USB control
USB devices can be a significant vector for the distribution of cyber attacks. However, over 35% of respondents don’t control or limit any device connecting to end points via USB.
  1. Data loss prevention
Some 37% of companies have no assurance against loss of information, documents, and IP.
  1. Reverse engineering of malware
Only 39% of organizations are actively working on reverse engineering of malware, while 32% are still in an initial phase of developing this.
  1. Emergency response team
Only 16% of assessments showed a fully capable emergency response team, while 51% of companies would be able to put together an emergency response team and are somewhat prepared to respond to a potential breach. However, 32% of organizations would fall short in responding, cleaning up, and analyzing a cyber attack.
  1. Breach indicators
Reporting systems, log managers, security information, and event management (SIEM) systems automatically raise the alarm when indicators reach a point which is deemed unacceptable, reducing the potential impact to the network. Only 38% of organizations are actively monitoring their breach indicators, while 41% have only average capabilities of monitoring and interpreting these. Less than 20% are unable to clearly identify breach indicators as they occur.
  1. Disk encryption
Full disk encryption protects against data theft and loss, especially in the case of a machine or device being removed from a secure environment. The responses show that less than 30% of organizations are enforcing disk encryption.
  1. Application control
Less than half the respondents said their organizations are running an active application control programme, with 25% not actively controlling or limiting the applications within their network. Some 27% are enforcing some application control policies.
  1. Mobile device management (MDM)
Although 26% of companies haven’t yet started to address the fact that mobile devices need to be protected to the same level as laptops or desktops, over half the organizations are actively running MDMt, while 22% have already started to enforce some MDM policies within their organizations.
These results show that an encouraging proportion of companies are actively deploying protection, but most don’t feel fully prepared and are focused on further optimization. None felt completely unprepared but all acknowledged a greater need for enhanced security.

Anurag

Comments

Popular posts from this blog

Standard and Formatted Input / Output in C++

The C++ standard libraries provide an extensive set of input/output capabilities which we will see in subsequent chapters. This chapter will discuss very basic and most common I/O operations required for C++ programming. C++ I/O occurs in streams, which are sequences of bytes. If bytes flow from a device like a keyboard, a disk drive, or a network connection etc. to main memory, this is called   input operation   and if bytes flow from main memory to a device like a display screen, a printer, a disk drive, or a network connection, etc., this is called   output operation . Standard Input and Output in C++ is done through the use of  streams . Streams are generic places to send or receive data. In C++, I/O is done through classes and objects defined in the header file  <iostream> .  iostream  stands for standard input-output stream. This header file contains definitions to objects like  cin ,  cout , etc. /O Library Header Files There are...

locking

DBMS Locking Part I (DBMS only) TECHNICAL ARTICLES -> PERFORMANCE ARTICLES [  Back  ] [  Next  ] DBMS is often criticized for excessive locking – resulting in poor database performance when sharing data among multiple concurrent processes. Is this criticism justified, or is DBMS being unfairly blamed for application design and implementation shortfalls? To evaluate this question, we need to understand more about DBMS locking protocols. In this article, we examine how, why, what and when DBMS locks and unlocks database resources. Future articles will address how to minimize the impact of database locking. THE NEED FOR LOCKING In an ideal concurrent environment, many processes can simultaneously access data in a DBMS database, each having the appearance that they have exclusive access to the database. In practice, this environment is closely approximated by careful use of locking protocols. Locking is necessary in a concurrent environment to as...

DATA WAREHOUSE VERSUS DATA MART: THE GREAT DEBATE

DATA WAREHOUSE VERSUS DATA MART: THE GREAT DEBATE Customers exploring the field of business intelligence for the first time often lead with: What is the difference between a data warehouse and a data mart? The next question follows as predictably as night follows day: which one does my company need? Let me start by saying that the two terms are often confused. Indeed, some people in the industry use them virtually interchangeably, which is unfortunate, because they do reflect a valuable hierarchical difference. The Data Warehouse A "data warehouse" will typically contain the full range of business intelligence available to a company from all sources. That data consists of transaction-processing records, corporate and marketing data, and other business operations information; for example, a bank might include loans, credit card statements, and demand deposits data, along with basic customer information. This internal data is frequently combined with statistica...