According to the latest survey results from the Institute of Information Security Professionals (IISP), 66% of business leaders feel they have become better prepared at responding and handling a major cyber-attack, a rise from 47% in the past three years.
However, the security professionals who were surveyed offer a different opinion. Nearly a fifth (18%) believe that organizations have shown signs that their abilities to defend against a security breach have become worse. This is an increase of 9% during the same time period.
Yet, the goalposts may have moved for companies as cyber resilience is the primary motivator.
In today’s climate, suffering a cyberattack is a matter of when, not if, and so businesses must ensure their policies and security systems implemented include enhanced detection and response capabilities. Having the right security defenses in place is critical for any organization to survive a cyber-attack.
That is often easier said than done, especially when there is a recognized lack of security professionals available. In fact, the perceived problems due to lack of skills has grown amongst infosecurity professionals from 8% in 2015 to 18%.
With a limited workforce available to man the necessary control systems, and with budgets supposedly reduced, the pressures around security have naturally increased.
Also, with the formation of the European General Data Protection Regulation (GPDR), which is law as of the 25th of May, has added to the list of security demands. Data protection must be taken seriously and under GDPR, any organization found non-compliant with the strict rules could suffer severe financial penalties.
Addressing data protection can be problematic and, with endless security solutions available in the market, it can become challenging selecting the right technology that is not only suited to the organization’s needs but also GDPR compliance.
A step in the right direction for any business would be to adopt an encryption-based solution to protect sensitive data at all stages of its lifecycle.
Article Source: ComputerWeekly.com