Story image

IT decision makers unsure about their security maturity

11 Apr 2018

IT-decision makers in Asia Pacific, the United Kingdom, and the United States are only ‘moderately’ confident they are able to protect their organisations against hackers, and it might take time to find out when they have been breached.

LogRhythm’s 2018 Cybersecurity Benchmark Survey polled 751 decision makers – of which less than half were able to detect a major cybersecurity incident within one hour.

Even those who did detect a major incident would be unable to contain the breach within an hour.

“Cyber threats continue to grow in volume and intensity. Seemingly every month, another massive security breach dominates the headlines,” comments LogRhythm’s VP of marketing and business development, Matt Winter.

Organisations may be feeling the pressure – despite the desire to grow their security maturity, more than half of respondents say they have just 10 or fewer people in their security teams.

Security maturity is also benchmarked by the number of threat detection programs organisations have in place. The survey found that more than 70% have programs to detect specific threats like ransomware and employee threats.

More than a quarter use at least 10 security software solutions to manage security threats. Working with budgets may influence the number of tools businesses use.

Respondents in Asia Pacific put forth the highest IT budget allocation to security, but overall executives allocate security less than 10% of their budget.

A quarter of executives are not comfortable with such low levels of funding, however 57% said they were ‘moderately comfortable’.

Half of polled respondents still believe a determined hacker can breach their organization. In Asia Pacific, 39% had experienced a breach in the last year.

60% of respondents are sceptical about their security software can detect all major breaches.

However, confidence in security is also influenced by other factors, including targeted threat protection solutions.

“For instance, decision makers who did not report having programs to protect against threats such as ransomware, insider threats, and service denial attacks are less confident in their security programs. Unsurprisingly, that same segment reported slower rates of detection, response, and containment,” LogRhythm says.

When respondents were asked to consider how their organization operates from a threat lifecycle management perspectives, respondents were not optimistic. One third said they need help at all stages in the lifecycle, particularly with detection, investigation, neutralization, and recovery from cyber threats.

“To combat these threats, organizations need to carefully plan their budgets and strategies, while developing effective programs that tackle specific threats and keep them one step ahead of cyberattackers,” Winter concludes.

Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Trend Micro introduces cloud and container workload security offering
Container security capabilities added to Trend Micro Deep Security have elevated protection across the DevOps lifecycle and runtime stack.
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
EXCLUSIVE: Forcepoint global channel chief talks strategy
As a solution sold 100% via the channel, cybersecurity solutions company Forcepoint places a strong emphasis on its partner relationships.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."