Despite the tense security situation, companies overestimate the effectiveness of their security measures. A study shows that cloud automation can be the key to future-proof cybersecurity.
The majority of IT decision-makers see cloud automation as an important key to future-proof cyber security, especially in combination with autonomous privileges and access. This is the result of a recent survey by Delinea, a leading provider of privileged access management (PAM) solutions. 86 percent of those surveyed are currently looking for ways to automate access controls, especially for privileged access. At the same time, companies are also increasing their resources to meet the growing threat landscape. 68 percent of those surveyed said they would increase both their IT budget and IT staff in 2022.
Study “Cloud Automation is the Key to Future-Proofing Cybersecurity”
The Cloud Automation is the Key to Future-Proofing Cybersecurity report is based on responses from more than 300 IT decision makers surveyed in February 2022 on behalf of Delinea by global research firm Censuswide. He outlines key insights for developing a security strategy that supports future growth and offers tips on navigating the complex and ever-changing cybersecurity landscape. In this context, future-proofing means products, services or technological systems that are designed in such a way that they continue to function over time without significant updates and can therefore also be used in the fight against future cyber threats. In this way, companies avoid the need to constantly adapt or replace systems and infrastructure.
Uncertainty Factor Cloud
With the increasing migration from on-premises systems to hybrid or multi-cloud environments, the complexity of managing the different IT environments also increases. IT teams face the challenge of implementing and managing consistent security policies. This is also reflected in the report: 59 percent of those surveyed stated that their main motivation for making access security fit for the future this year is the increasingly complex multi-cloud IT environments.
Cybersecurity: imagination versus reality
Another finding of the report is that many companies continue to overestimate the effectiveness of their own security measures. Despite challenges such as increasing ransomware attacks or a hybrid workforce, many IT leaders believe they are well prepared for cyberattacks: 83 percent of them are confident that their current access controls are up to the requirements and 71 percent believe that they can recover quickly from a cyber attack.
Respondents also appear to have confidence in their PAM: 69 percent consider their current security approach to privileged access to be very mature or mature, and almost 90 percent think they are able to monitor and report unauthorized privileged activity.
Over 60 percent have already been victims of attacks
The reality shows a more dramatic situation: Two out of three companies admit that they have already been victims of cyber attacks. Additionally, it takes an average of 280 days to identify and contain a data breach, according to IBM's Cost of a Data Breach Report.
“The current report presents a paradox, considering that the majority of respondents feel secure about their current cybersecurity measures despite the significant number of security breaches caused by compromised credentials. Yet IT decision makers are aware that the future of their enterprise security lies in cloud automation, which for most represents a dynamic shift in approach, investment and resources,” said Joseph Carson, Advisory CISO and Chief Security Scientist at Delinea. “Today's cyber threats are faster, smarter and more dangerous. To avoid security issues and survive in today's unpredictable landscape, organizations have little choice but to rely heavily on automation and implement best practices like Least Privilege and Zero Trust at every turn.”
More at Delinea.com
About Delinea
Delinea is a leading provider of Privileged Access Management (PAM) solutions that enable seamless security for modern, hybrid businesses. Our solutions enable organizations to secure critical data, devices, code and cloud infrastructure to reduce risk, ensure compliance and simplify security.