Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Dynamic Cybersecurity Needs: Reassessing Security
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Dynamic Cybersecurity Needs: Reassessing Security
Data ManagementITSecurity

Dynamic Cybersecurity Needs: Reassessing Security

thu@duosecurity.com
thu@duosecurity.com
4 Min Read
SHARE

cybersecurity

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic – 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.

cybersecurity

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic – 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.

More Read

data protection strategies
End User Data Threats Businesses Can’t Ignore
The Role of Data Protection Regulations for Data-Driven Brands
Could Machine Learning Help Startups Beat the Odds?
Why a Chargeback Model for Private Cloud May Be Problematic
Are Video Streams Overflowing, And Will You Pay For It?

When it comes to protecting their organizations from a data breach, 88 percent pinpoint human behavior as the primary weakness in any security plan. This comes as no surprise, as a number of breaches can be attributed to behaviors such as poor password management (using weak or default passwords, sharing or reusing them, etc.).

Or, they may be tricked into sharing them with attackers, by means of a phishing email or fake login website. However, humans also built security technology solutions, and those can introduce a number of errors or vulnerabilities to an organization. And by implementing those security solutions, organizations may be lulled into a false sense of security and preparedness.

Which may be avoided with some due diligence from the organization itself – Nuix reports that 27 percent of the survey’s respondents reassess their cybersecurity needs on a quarterly basis. Thirty-one percent conduct formal cybersecurity reassessments on a yearly basis. With new malware introduced month by month, and more information about new attacks with every breach investigation undergone, it’s important for organizations to realize cybersecurity is always changing.

Identifying weak points on a regular basis can help keep your company ahead of the game. For example, if you’ve signed a number of new vendors and given them access to any applications that touch your network, you might want to ensure their access is secure in a few different ways:

  • Limited privileges – Use role-based access controls to limit what their user accounts can do within your network or application(s), also known as employing granular permissions.
  • Authentication – Require the use of not only a complex password, but also the use of two-factor authentication whenever vendors connect remotely.
  • Standardize Tools – Choose a secure VPN or remote tool, and block the use of unsecured remote access tools used to connect to your systems.
  • Log Activity – Set up logging in order to track user activity, including authentication attempts and any activity within your network to provide real-time and historical insight into anomalies.

Additionally, 73 percent of respondents have since migrated data to the cloud, contributing to the idea that a perimeterless IT environment has emerged, creating new needs for security. In particular, the report identified legal teams and law firms as key targets, as they deal often with sensitive information. Find out more about concerns with law firm security in Audits & Scrutiny Drive Law Firms to Seek Stronger IT Security Profiles.

TAGGED:cybersecurity
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

AI role in medical industry
The Role Of AI In Transforming Medical Manufacturing
Artificial Intelligence Exclusive
b2b sales
Unseen Barriers: Identifying Bottlenecks In B2B Sales
Business Rules Exclusive Infographic
data intelligence in healthcare
How Data Is Powering Real-Time Intelligence in Health Systems
Big Data Exclusive
intersection of data
The Intersection of Data and Empathy in Modern Support Careers
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

ransomware increase
Data Management

AI-Savvy Hackers Threaten Businesses With 20% Ransomware Increase

6 Min Read
cybersecurity mistakes
Best PracticesData ManagementExclusiveITPrivacyRisk ManagementSecurity

7 Disastrous Cybersecurity Mistakes In A Big Data World

8 Min Read
Privacy Concerns
Big DataPrivacy

How Big Data and Privacy Concerns Create an Exodus from Google

5 Min Read
tips to bolster cybersecurity
Security

5 Vital And Helpful Data-Driven Tips To Bolster Cybersecurity

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?