Is Cyber Security Lagging a Grade Behind Other Technology?

November 25, 2022

The average computer user is unaware of how invasive and harmful cyber attacks are. Forbes details how little individuals and companies know about cyber crime in, “Why We Need A Cyber Intelligence Revolution.” Peiter Zatko is an infamous hacker and the former head of Twitter’s security. He revealed in a whistleblower complaint that Twitter’s protections are at risk because of poor security measures.

The whistleblower complaint was not a surprise to the cybersecurity world, but it was to everyone else. Companies and individuals need to be aware of the capabilities and limitations of cyber security. Companies should also set up reasonable expectations for their cybersecurity teams. Businesses are more at risk from security breaches, ransomware, and other threats. Legacy systems are especially vulnerable, because they were not designed to handle modern cyber attacks.

Cybersecurity teams need to be proactive. They can be proactive by gathering real-time intelligence from multiple sources to identify and prevent bad actors from attacking. Cybersecurity workers are in a pickle though:

“Our company recently conducted a survey of more than 300 IT professionals to determine the state of enterprise cybersecurity today and gather insights to lead us into a more secure future. Seventy-two percent of respondents have added new technologies in the past 12 months and nearly half (46%) have more than six tools and services in their security stack today. At the same time, 27% don’t even know how many tools they have in their security stack, and almost a quarter of professionals (24%) said their security posture is average or below average, indicating their awareness of their security stack vulnerabilities.”

A Gartner survey also found that 75% of organizations are investing in security vendor consolidation, because they want to reduce the strain on their cybersecurity teams. It is even worse that the old methods, such as firewalls, do not work anymore.

Organizations and individuals can take a few steps to ensure they remain safe. They can assess their current security plan and run a threat scan, use proactive and reactive solutions, and integrate threat intelligence from multiple sources.

Whitney Grace, November 25, 2022


Comments are closed.

  • Archives

  • Recent Posts

  • Meta