Cyber ​​resilience: Insufficiently prepared despite fear of attacks

Cyber ​​resilience: Insufficiently prepared despite fear of attacks
Advertising

Share post

In a study, managers from the areas of security and IT operations commented on cyber resilience in their company. The majority expect an attack.

Commvault has released a new IDC report commissioned by Commvault entitled “The Cyber-Resilient Organization: Maximum Preparedness with Bullet-Proof Recovery Survey.”

Advertising

In this report, IDC surveyed more than 500 security and IT operations executives worldwide to get an up-to-date overview of how organizations perceive modern security threats and how they are strengthening their cyber resilience. The key findings of this report fall into three areas: senior leadership commitment to cyber resilience initiatives, fears of data leaks and vulnerable workloads, and the need for automation.

Cyber ​​resilience starts in the executive suite – or does it?

The study shows that in many cases, senior executives or directors are barely involved in their company's cyber resilience initiatives - only a third (33 percent) of CEOs or directors and less than a quarter (21 percent) of other senior executives Employees are heavily involved. According to the study, the majority (52 percent) of senior executives are not involved in their company's cyber events.

Advertising

Subscribe to our newsletter now

Read the best news from B2B CYBER SECURITY once a month



By clicking on "Register" I agree to the processing and use of my data in accordance with the declaration of consent (please open for details). I can find more information in our Privacy Policy. After registering, you will first receive a confirmation email so that no other person can order something you don't want.
Expand for details on your consent
It goes without saying that we handle your personal data responsibly. If we collect personal data from you, we process it in compliance with the applicable data protection regulations. Detailed information can be found in our Privacy Policy. You can unsubscribe from the newsletter at any time. You will find a corresponding link in the newsletter. After you have unsubscribed, your data will be deleted as soon as possible. Recovery is not possible. If you would like to receive the newsletter again, simply order it again. Do the same if you want to use a different email address for your newsletter. If you would like to receive the newsletter offered on the website, we need an e-mail address from you as well as information that allows us to verify that you are the owner of the e-mail address provided and that you agree to receive the newsletter. Further data is not collected or only collected on a voluntary basis. We use newsletter service providers, which are described below, to process the newsletter.

CleverReach

This website uses CleverReach to send newsletters. The provider is CleverReach GmbH & Co. KG, Schafjückenweg 2, 26180 Rastede, Germany (hereinafter “CleverReach”). CleverReach is a service that can be used to organize and analyze the sending of newsletters. The data you enter for the purpose of subscribing to the newsletter (e.g. email address) will be stored on the CleverReach servers in Germany or Ireland. Our newsletters sent with CleverReach enable us to analyze the behavior of the newsletter recipients. This can include It is analyzed how many recipients have opened the newsletter message and how often which link in the newsletter was clicked. With the help of so-called conversion tracking, it can also be analyzed whether a previously defined action (e.g. purchase of a product on this website) took place after clicking on the link in the newsletter. Further information on data analysis by CleverReach newsletter is available at: https://www.cleverreach.com/de/funktionen/reporting-und-tracking/. The data processing takes place on the basis of your consent (Art. 6 Para. 1 lit. a DSGVO). You can revoke this consent at any time by unsubscribing from the newsletter. The legality of the data processing operations that have already taken place remains unaffected by the revocation. If you do not want an analysis by CleverReach, you must unsubscribe from the newsletter. For this purpose, we provide a corresponding link in every newsletter message. The data you have stored with us for the purpose of subscribing to the newsletter will be stored by us or the newsletter service provider until you unsubscribe from the newsletter and deleted from the newsletter distribution list after you have canceled the newsletter. Data stored by us for other purposes remain unaffected. After you have been removed from the newsletter distribution list, your e-mail address may be stored by us or the newsletter service provider in a blacklist if this is necessary to prevent future mailings. The data from the blacklist is only used for this purpose and is not merged with other data. This serves both your interest and our interest in complying with the legal requirements when sending newsletters (legitimate interest within the meaning of Art. 6 Para. 1 lit. f GDPR). Storage in the blacklist is not limited in time. You may object to the storage if your interests outweigh our legitimate interest. For more information, see the privacy policy of CleverReach at: https://www.cleverreach.com/de/datenschutz/.

Data processing

We have concluded a data processing agreement (DPA) for the use of the above-mentioned service. This is a contract mandated by data privacy laws that guarantees that they process personal data of our website visitors only based on our instructions and in compliance with the GDPR.

In addition to the lack of commitment from managers, it is often unclear between ITOps and SecOps teams who is responsible for what to prepare cyber defense. Only 30 percent of SecOps teams fully understand ITOps roles and responsibilities related to cyber attack preparedness and response. Only 29 percent of ITOps teams know which tasks fall within the scope of SecOps.

According to IDC, business leaders have a key role to play in ensuring organizations prioritize preparing for cyberattacks. Additionally, organizations must ensure that the ITOps and SecOps teams operate in complete coordination with one another. Otherwise, companies are more vulnerable to successful attacks and recovery processes are more lengthy.

Big problem: data leaks – workloads vary in their vulnerability

61 percent of respondents believe data breaches are “likely” to “very likely” in the next 12 months due to increasingly sophisticated attacks. Study participants considered on-premises workloads to be more vulnerable than cloud workloads. On a scale of one to five, with five being high risk, respondents rated on-premises data storage at 2,8 and physical workloads at 2,77 - higher than cloud workloads (2,67).

Data exfiltration is the preferred tactic; manual detection processes fall short

The study also shows that data exfiltration attacks – in which malware or a malicious actor performs an unauthorized data transfer – are nearly 50 percent more common than attacks in which hackers attempt to decode encrypted data. Respondents ranked phishing as the biggest threat to combat. This is because most ransomware attacks begin by successfully compromising user account login credentials.

As cyber attackers use increasingly sophisticated tactics, it is likely that anomalies and successful attacks will be missed if IT managers rely on manual detection and reporting procedures. A possible solution – automation – could detect attacks and risks more quickly in order to reduce the consequences of attacks. However, most companies (57 percent) only automate their key functions to a limited extent. This increases the likelihood that they will miss a threat before it occurs. Only 22 percent of those surveyed say they have fully automated their processes.

Cyber ​​resilience by integrating different approaches

"Cyber ​​attackers never rest and are constantly discovering new ways to exploit vulnerabilities. A truly effective cyber resilience strategy must go beyond mere backup and recovery. It is critical that organizations adopt a new approach that includes prevention and mitigation as well as recovery," said Phil Goodwin, research vice president, Infrastructure Systems, Platforms and Technologies Group, IDC. "Whether on-premises, in the cloud, or in a hybrid environment, security leaders must integrate multiple layers of defense. With AI now a tool for both defense and offense, the urgency of comprehensive cyber resilience has never been more evident."

"Reacting to cyber threats is a thing of the past. Leadership must ensure teams prioritize proactive defense, real-time risk analysis and robust risk management to pave the way for true cyber resilience," said Javier Dominguez, CISO, Commvault. "It's also critical that SecOps and ITOps teams work closely together to take a holistic, end-to-end view of their security posture. With Commvault, resilience isn't an afterthought - it's a blueprint."

Methodology

Commvault wanted to explore how organizations are approaching cyber resilience, common gaps in cyber response, and best practices learned and described by senior IT professionals. To make this possible, Commvault commissioned IDC to conduct an independent study to find answers to these important questions.

The survey methodology used by IDC was as comprehensive as possible and included all three primary survey approaches: a focus group with eight IT executives from large US companies (multinational corporations) with the titles CIO, CTO and CISO; individual in-depth interviews with other CIOs; and a global survey of 513 senior IT and security professionals.

More at Commvault.com

 


About Commvault

Commvault is the leading provider of backup and recovery. Commvault's converged data management solution redefines what backups mean to the advanced business with applications that protect, manage, and utilize their most valuable asset: their data. Software, solutions and services are available directly from Commvault and from a global network of proven partners. The company employs more than 2.300 highly qualified people worldwide, is traded on the NASDAQ (CVLT) and is headquartered in Tinton Falls, New Jersey, USA.


Matching articles on the topic

Multimodal AI improves cyber defense

Best recognition rates when using multimodal AI: Instead of analyzing individual events, multimodal AI simultaneously examines entire data streams, evaluates images and ➡ Read more

Security: 40.000 times more machine identities

A report shows that with 40.000 times more machine identities than human ones, this poses a challenge for corporate security. At the same time, organizations are gaining ➡ Read more

Attackers increasingly rely on data exfiltration

Cybercriminals are adapting their methods to circumvent defenders' increasingly stringent security measures, according to the results of a recent threat ➡ Read more

Agent-based cybersecurity with an open source model

Trend Micro’s AI agent Trend Cybertron is released as an open source model. The AI ​​model and agent framework1 is intended to facilitate the development of autonomous ➡ Read more

OpenCloud: Alternative file management solution

File management, file sharing and content collaboration - but in new ways and away from solutions of the large digital corporations Microsoft SharePoint ➡ Read more

Protect IoT and OT environments with MXDR

With the increasing number of IoT and OT devices, companies are increasing their attack surfaces for cybercriminals. Last year, almost every ➡ Read more

Hybrid SASE solution FireCloud Internet Access

With FireCloud Internet Access, WatchGuard Technologies presents the first product in a new family of hybrid Secure Access Service Edge (SASE) solutions. ➡ Read more

Proactive cybersecurity AI fends off attacks

Trend Micro's first proactive cybersecurity AI sets new standards with new capabilities for proactive risk management, threat modeling, attack path ➡ Read more