Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

City AM has revealed that just over half (51%) of businesses in the UK have suffered a cyber-attack in the last 12 months. Research by the Chartered Institute of Internal Audits (CIIA), which quizzed nearly 200 businesses of all sizes and across various sectors, found the biggest barrier to implementing better cybersecurity practices during the pandemic were competing priorities, employees working remotely, and insufficient budgets.

Experts Comments

February 24, 2021
Chris Ross
SVP
Barracuda Networks

The pandemic has presented serious challenges to the company’s cybersecurity policies, with many businesses struggling to effectively equip its distributed workforce with the tools and know-how to defend themselves against the increasing threat facing them. In a home-environment, weakened security gives cyberattackers the opportunity to hack into home networks, via IoT devices, shared devices, or unsecured or public WiFi networks.”

 

Combatting the issue from a business perspective requires an

.....Read More

The pandemic has presented serious challenges to the company’s cybersecurity policies, with many businesses struggling to effectively equip its distributed workforce with the tools and know-how to defend themselves against the increasing threat facing them. In a home-environment, weakened security gives cyberattackers the opportunity to hack into home networks, via IoT devices, shared devices, or unsecured or public WiFi networks.”

 

Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. Personal devices must be protected with VPN or ZTNA software, and public cloud applications and infrastructure should be properly protected with the right application security. Employees should go through regular training on the evolving cyber threatscape, and learn the best-practice security methods when working from a remote environment. CSOs and IT Managers also have a responsibility to remain on the lookout for new angles and entry points to their system, which hackers could find, and take advantage of, unless properly diagnosed.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.