Post by account_disabled on Sept 16, 2023 6:18:03 GMT -5
According to several security experts, economic volatility increases security risks while also creating a number of factors that can negatively impact defenses. “The answer to the question of whether recessions and difficult economic times lead to more attacks is yes,” said Sergio Tenreiro de Magalhae, chair of the Cybersecurity Program at Champlain College Online. “The reasons are complex,” he said.
First, companies increase their own Phone Number List risk by responding to economic pressures. According to the survey , CEOs around the world are seeking to contain costs and reduce discretionary spending and may maintain/reduce spending to keep pace with inflation. But failing to provide sufficient funding to departments has knock-on effects. Business-level employees have less time to receive security training and are more likely to take shortcuts to get work done. IT companies that need to do more with less may need more time to extend the life of older systems and deploy essential patches.
According to several security experts, economic volatility increases security risks while also creating a number of factors that can negatively impact defenses. “The answer to the question of whether recessions and difficult economic times lead to more attacks is yes,” said Sergio Tenreiro de Magalhae, chair of the Cybersecurity Program at Champlain College Online. “The reasons are complex,” he said.
First, companies increase their own risk by responding to economic pressures. According to the survey , CEOs around the world are seeking to contain costs and reduce discretionary spending and may maintain/reduce spending to keep pace with inflation. But failing to provide sufficient funding to departments has knock-on effects. Business-level employees have less time to receive security training and are more likely to take shortcuts to get work done. IT companies that need to do more with less may need more time to extend the life of older systems and deploy essential patches.
Likewise, security teams may have less time to invest in new technologies that speed detection and response. This change is actually already happening. IBM's 2022 Cost of Breach ReportAccording to , it took companies an average of 207 days to identify a breach and an additional 70 days to contain it. "We're having to do more with less than we did a few years ago because we didn't already have enough money or staff," said Forrester analyst Jeff Pollard. “It’s a really difficult challenge,” he pointed out.
Why Layoffs Increase Security Threats
According to the (ISC)² report, layoffs are increasing business risk in general, and the IT industry is likely to see more layoffs in the future. According to the (ISC)² report, 85% of executives believe layoffs will be necessary due to the economic slowdown. “We already know that being laid off or losing a job is a predictor of insider threats and increases the likelihood of a security incident,” Pollard said. “I’ve seen this happen for years,” he said.
Pollard and other security experts say layoffs typically increase insider incidents for several reasons. According to Verizon's ' 2022 Data Breach Report ', insider incidents already account for 20% of data breaches. Laid off workers, especially those working remotely at least part of the time, may have company data on their personal devices. If you are notified of termination, most of your data will remain on your device. “During the pandemic, data has moved to a lot of places,” Pollard said. “Data is distributed and may reside on devices beyond your control.”
At the same time, laid-off workers may strike back at their former employers due to anger or personal financial circumstances. Employees who see their colleagues getting fired may also be motivated to take action.
It is explained that the damage that can occur if employees directly misuse data or sell information to a hacker group can be significant. “If you have a doctor, you can sell it,” said Pete Nicoretti, CISO for the Americas at Check Point Software. It used to be difficult, but now it's easy. In the past, you could only take what you could carry in your briefcase. Now you can take terabytes with you. "Also, if you're in a technical role with networking or Active Directory access, you can see all kinds of unusual behavior."
Requires proper prioritization and a solid security strategy
This dynamic increases the frequency of cyberattacks, which have already reached record levels. According to Check Point research , the volume of global cyberattacks peaked in the fourth quarter, reaching an average of 1,168 attacks per organization per week. Additionally, global cyber attacks in 2022 increased by 38% compared to 2021. “If you believe that layoffs and economic downturns are increasing insider threats, then you are right to believe that hacker activity will also increase,” said Claire Rosso, CEO of (ISC)².
Despite concerns that risks will increase in a recession, there are also some hopeful signs for CSIOs. Rosso said an (ISC)² study of senior business executives found no inclination to reduce their cybersecurity workforce. “Only 10% of respondents expected to reduce the number of cybersecurity team members. “The average expected reduction in staff in other areas was 20%,” he added. The same study also found that when organizations are ready to rehire after downsizing, cybersecurity talent is at the top of the list for reinvestment.
However, CSIOs should not rely on these encouraging reports to help them navigate current economic uncertainty or future economic volatility. Worstell explains that CSIOs need to strengthen their basic security strategies. This means strengthening detection/response programs as well as patch programs, increasing training and awareness efforts, and reducing technical debt.
He continued, “The difference between good security and excellent security is ‘done’ and ‘definitely completed.’ The latter means that it has been tested, verified and proven and therefore has ‘proof’ that it is being completed. “It’s the difference between a kind of lockdown and proving a lockdown,” he added.
Worstell advises setting priorities based on current risks and then updating your security strategy as any changes occur to respond to economic changes. It is also helpful to focus on account management and access controls to ensure the right level of access and only allow access to currently authorized employees.
Worstel said CSIOs must also be committed to supporting high-level cybersecurity by devising a security strategy that communicates the value that security provides and supports both individual department plans as well as the overall corporate agenda. “Good communication is key.” “This ability will go a long way in conserving resources during an economic downturn.”
원문보기:
www.itworld.co.kr/topnews/280849#csidx31941e1b9bf4d64847dcd43ab54b594
Likewise, security teams may have less time to invest in new technologies that speed detection and response. This change is actually already happening. IBM's 2022 Cost of Breach ReportAccording to , it took companies an average of 207 days to identify a breach and an additional 70 days to contain it. "We're having to do more with less than we did a few years ago because we didn't already have enough money or staff," said Forrester analyst Jeff Pollard. “It’s a really difficult challenge,” he pointed out.
Why Layoffs Increase Security Threats
According to the (ISC)² report, layoffs are increasing business risk in general, and the IT industry is likely to see more layoffs in the future. According to the (ISC)² report, 85% of executives believe layoffs will be necessary due to the economic slowdown. “We already know that being laid off or losing a job is a predictor of insider threats and increases the likelihood of a security incident,” Pollard said. “I’ve seen this happen for years,” he said.
Pollard and other security experts say layoffs typically increase insider incidents for several reasons. According to Verizon's ' 2022 Data Breach Report ', insider incidents already account for 20% of data breaches. Laid off workers, especially those working remotely at least part of the time, may have company data on their personal devices. If you are notified of termination, most of your data will remain on your device. “During the pandemic, data has moved to a lot of places,” Pollard said. “Data is distributed and may reside on devices beyond your control.”
At the same time, laid-off workers may strike back at their former employers due to anger or personal financial circumstances. Employees who see their colleagues getting fired may also be motivated to take action.
It is explained that the damage that can occur if employees directly misuse data or sell information to a hacker group can be significant. “If you have a doctor, you can sell it,” said Pete Nicoretti, CISO for the Americas at Check Point Software. It used to be difficult, but now it's easy. In the past, you could only take what you could carry in your briefcase. Now you can take terabytes with you. "Also, if you're in a technical role with networking or Active Directory access, you can see all kinds of unusual behavior."
Requires proper prioritization and a solid security strategy
This dynamic increases the frequency of cyberattacks, which have already reached record levels. According to Check Point research , the volume of global cyberattacks peaked in the fourth quarter, reaching an average of 1,168 attacks per organization per week. Additionally, global cyber attacks in 2022 increased by 38% compared to 2021. “If you believe that layoffs and economic downturns are increasing insider threats, then you are right to believe that hacker activity will also increase,” said Claire Rosso, CEO of (ISC)².
Despite concerns that risks will increase in a recession, there are also some hopeful signs for CSIOs. Rosso said an (ISC)² study of senior business executives found no inclination to reduce their cybersecurity workforce. “Only 10% of respondents expected to reduce the number of cybersecurity team members. “The average expected reduction in staff in other areas was 20%,” he added. The same study also found that when organizations are ready to rehire after downsizing, cybersecurity talent is at the top of the list for reinvestment.
However, CSIOs should not rely on these encouraging reports to help them navigate current economic uncertainty or future economic volatility. Worstell explains that CSIOs need to strengthen their basic security strategies. This means strengthening detection/response programs as well as patch programs, increasing training and awareness efforts, and reducing technical debt.
He continued, “The difference between good security and excellent security is ‘done’ and ‘definitely completed.’ The latter means that it has been tested, verified and proven and therefore has ‘proof’ that it is being completed. “It’s the difference between a kind of lockdown and proving a lockdown,” he added.
Worstell advises setting priorities based on current risks and then updating your security strategy as any changes occur to respond to economic changes. It is also helpful to focus on account management and access controls to ensure the right level of access and only allow access to currently authorized employees.
Worstel said CSIOs must also be committed to supporting high-level cybersecurity by devising a security strategy that communicates the value that security provides and supports both individual department plans as well as the overall corporate agenda. “Good communication is key.” “This ability will go a long way in conserving resources during an economic downturn.
First, companies increase their own Phone Number List risk by responding to economic pressures. According to the survey , CEOs around the world are seeking to contain costs and reduce discretionary spending and may maintain/reduce spending to keep pace with inflation. But failing to provide sufficient funding to departments has knock-on effects. Business-level employees have less time to receive security training and are more likely to take shortcuts to get work done. IT companies that need to do more with less may need more time to extend the life of older systems and deploy essential patches.
According to several security experts, economic volatility increases security risks while also creating a number of factors that can negatively impact defenses. “The answer to the question of whether recessions and difficult economic times lead to more attacks is yes,” said Sergio Tenreiro de Magalhae, chair of the Cybersecurity Program at Champlain College Online. “The reasons are complex,” he said.
First, companies increase their own risk by responding to economic pressures. According to the survey , CEOs around the world are seeking to contain costs and reduce discretionary spending and may maintain/reduce spending to keep pace with inflation. But failing to provide sufficient funding to departments has knock-on effects. Business-level employees have less time to receive security training and are more likely to take shortcuts to get work done. IT companies that need to do more with less may need more time to extend the life of older systems and deploy essential patches.
Likewise, security teams may have less time to invest in new technologies that speed detection and response. This change is actually already happening. IBM's 2022 Cost of Breach ReportAccording to , it took companies an average of 207 days to identify a breach and an additional 70 days to contain it. "We're having to do more with less than we did a few years ago because we didn't already have enough money or staff," said Forrester analyst Jeff Pollard. “It’s a really difficult challenge,” he pointed out.
Why Layoffs Increase Security Threats
According to the (ISC)² report, layoffs are increasing business risk in general, and the IT industry is likely to see more layoffs in the future. According to the (ISC)² report, 85% of executives believe layoffs will be necessary due to the economic slowdown. “We already know that being laid off or losing a job is a predictor of insider threats and increases the likelihood of a security incident,” Pollard said. “I’ve seen this happen for years,” he said.
Pollard and other security experts say layoffs typically increase insider incidents for several reasons. According to Verizon's ' 2022 Data Breach Report ', insider incidents already account for 20% of data breaches. Laid off workers, especially those working remotely at least part of the time, may have company data on their personal devices. If you are notified of termination, most of your data will remain on your device. “During the pandemic, data has moved to a lot of places,” Pollard said. “Data is distributed and may reside on devices beyond your control.”
At the same time, laid-off workers may strike back at their former employers due to anger or personal financial circumstances. Employees who see their colleagues getting fired may also be motivated to take action.
It is explained that the damage that can occur if employees directly misuse data or sell information to a hacker group can be significant. “If you have a doctor, you can sell it,” said Pete Nicoretti, CISO for the Americas at Check Point Software. It used to be difficult, but now it's easy. In the past, you could only take what you could carry in your briefcase. Now you can take terabytes with you. "Also, if you're in a technical role with networking or Active Directory access, you can see all kinds of unusual behavior."
Requires proper prioritization and a solid security strategy
This dynamic increases the frequency of cyberattacks, which have already reached record levels. According to Check Point research , the volume of global cyberattacks peaked in the fourth quarter, reaching an average of 1,168 attacks per organization per week. Additionally, global cyber attacks in 2022 increased by 38% compared to 2021. “If you believe that layoffs and economic downturns are increasing insider threats, then you are right to believe that hacker activity will also increase,” said Claire Rosso, CEO of (ISC)².
Despite concerns that risks will increase in a recession, there are also some hopeful signs for CSIOs. Rosso said an (ISC)² study of senior business executives found no inclination to reduce their cybersecurity workforce. “Only 10% of respondents expected to reduce the number of cybersecurity team members. “The average expected reduction in staff in other areas was 20%,” he added. The same study also found that when organizations are ready to rehire after downsizing, cybersecurity talent is at the top of the list for reinvestment.
However, CSIOs should not rely on these encouraging reports to help them navigate current economic uncertainty or future economic volatility. Worstell explains that CSIOs need to strengthen their basic security strategies. This means strengthening detection/response programs as well as patch programs, increasing training and awareness efforts, and reducing technical debt.
He continued, “The difference between good security and excellent security is ‘done’ and ‘definitely completed.’ The latter means that it has been tested, verified and proven and therefore has ‘proof’ that it is being completed. “It’s the difference between a kind of lockdown and proving a lockdown,” he added.
Worstell advises setting priorities based on current risks and then updating your security strategy as any changes occur to respond to economic changes. It is also helpful to focus on account management and access controls to ensure the right level of access and only allow access to currently authorized employees.
Worstel said CSIOs must also be committed to supporting high-level cybersecurity by devising a security strategy that communicates the value that security provides and supports both individual department plans as well as the overall corporate agenda. “Good communication is key.” “This ability will go a long way in conserving resources during an economic downturn.”
원문보기:
www.itworld.co.kr/topnews/280849#csidx31941e1b9bf4d64847dcd43ab54b594
Likewise, security teams may have less time to invest in new technologies that speed detection and response. This change is actually already happening. IBM's 2022 Cost of Breach ReportAccording to , it took companies an average of 207 days to identify a breach and an additional 70 days to contain it. "We're having to do more with less than we did a few years ago because we didn't already have enough money or staff," said Forrester analyst Jeff Pollard. “It’s a really difficult challenge,” he pointed out.
Why Layoffs Increase Security Threats
According to the (ISC)² report, layoffs are increasing business risk in general, and the IT industry is likely to see more layoffs in the future. According to the (ISC)² report, 85% of executives believe layoffs will be necessary due to the economic slowdown. “We already know that being laid off or losing a job is a predictor of insider threats and increases the likelihood of a security incident,” Pollard said. “I’ve seen this happen for years,” he said.
Pollard and other security experts say layoffs typically increase insider incidents for several reasons. According to Verizon's ' 2022 Data Breach Report ', insider incidents already account for 20% of data breaches. Laid off workers, especially those working remotely at least part of the time, may have company data on their personal devices. If you are notified of termination, most of your data will remain on your device. “During the pandemic, data has moved to a lot of places,” Pollard said. “Data is distributed and may reside on devices beyond your control.”
At the same time, laid-off workers may strike back at their former employers due to anger or personal financial circumstances. Employees who see their colleagues getting fired may also be motivated to take action.
It is explained that the damage that can occur if employees directly misuse data or sell information to a hacker group can be significant. “If you have a doctor, you can sell it,” said Pete Nicoretti, CISO for the Americas at Check Point Software. It used to be difficult, but now it's easy. In the past, you could only take what you could carry in your briefcase. Now you can take terabytes with you. "Also, if you're in a technical role with networking or Active Directory access, you can see all kinds of unusual behavior."
Requires proper prioritization and a solid security strategy
This dynamic increases the frequency of cyberattacks, which have already reached record levels. According to Check Point research , the volume of global cyberattacks peaked in the fourth quarter, reaching an average of 1,168 attacks per organization per week. Additionally, global cyber attacks in 2022 increased by 38% compared to 2021. “If you believe that layoffs and economic downturns are increasing insider threats, then you are right to believe that hacker activity will also increase,” said Claire Rosso, CEO of (ISC)².
Despite concerns that risks will increase in a recession, there are also some hopeful signs for CSIOs. Rosso said an (ISC)² study of senior business executives found no inclination to reduce their cybersecurity workforce. “Only 10% of respondents expected to reduce the number of cybersecurity team members. “The average expected reduction in staff in other areas was 20%,” he added. The same study also found that when organizations are ready to rehire after downsizing, cybersecurity talent is at the top of the list for reinvestment.
However, CSIOs should not rely on these encouraging reports to help them navigate current economic uncertainty or future economic volatility. Worstell explains that CSIOs need to strengthen their basic security strategies. This means strengthening detection/response programs as well as patch programs, increasing training and awareness efforts, and reducing technical debt.
He continued, “The difference between good security and excellent security is ‘done’ and ‘definitely completed.’ The latter means that it has been tested, verified and proven and therefore has ‘proof’ that it is being completed. “It’s the difference between a kind of lockdown and proving a lockdown,” he added.
Worstell advises setting priorities based on current risks and then updating your security strategy as any changes occur to respond to economic changes. It is also helpful to focus on account management and access controls to ensure the right level of access and only allow access to currently authorized employees.
Worstel said CSIOs must also be committed to supporting high-level cybersecurity by devising a security strategy that communicates the value that security provides and supports both individual department plans as well as the overall corporate agenda. “Good communication is key.” “This ability will go a long way in conserving resources during an economic downturn.