IDG Contributor Network: Security and the boardroom: From advantage to imperative

IDG Contributor Network: Security and the boardroom: From advantage to imperative

Over the past year, all around the world, corporate IT teams watched in horror as one expensive and damaging corporate security breach after another popped up in the headlines. But the flashy ones that made the news are only a fraction of the ones that actually occurred. The use of digital technology expands every day, and so does the number of cyber criminals lurking on the Darknet who are ready and willing to take advantage of any weaknesses in the tech they can spot. As a result, as highlighted in CSO’s 2018 US State of Cybercrime Survey, organizations of all shapes and sizes have borne an onslaught of cyber-attacks and incurred billions in financial losses.

These unwelcome trends are pushing more and more firms to take IT security more seriously, which is good. But problems still remain on the governance front.

Threat detection is tougher

Although more time and resources are being directed on security than ever before, many organizations are having a hard time keeping a handle on the ever-evolving threat landscape. In fact, approximately one-quarter (23%) of the companies in the survey reported greater monetary losses than last year.

9 warning signs of bad IT architecture and see why these 10 old-school IT principles still rule. | Sign up for CIO newsletters. ]

Indeed, one of the downsides of the explosion in digital uptake in the workplace is that it expands the hunting ground for criminals. The more devices connected to a corporate network – and in some organizations running IoT use cases there may be hundreds of thousands, or millions of endpoints – the more potential ways there are for criminals to somehow find their way in. Complicating this is the fact that, increasingly, the market demands greater connections – between companies and customers, between partners and suppliers. But in today’s digital environment, greater accessibility is practically a synonym for a greater attack surface. 

The more diverse infrastructure landscape also introduces another pitfall: it makes breaches harder to detect. In 2016, the time between intrusion and detection of an attack was 80.6 days. A year later, it was 92.2 days, and last year it was 108.5 days. This also suggests that cyber criminals are becoming ever more sophisticated and launching more complex attacks.

Tightening regulatory frameworks

The result of all this is that security incidents are having a greater impact on businesses than ever. Whether a breach exposes a massive store of PII data, or a DDoS attack shuts down a business for hours or days, it isn’t just the bottom line that takes a hit. So does the firm’s brand and reputation – two words that resonate loudly with customers and shareholders, not to mention other company stakeholders such as partners and suppliers.

Leave a comment

Contact Us


    Please use this form to contact us or email us at [email protected]

    Address

    Singapore CBD

    Phone-no

    +65 8714 2780