Organizations across just about every industry have been impacted by the pandemic, and among the biggest IT security challenges are issues related to remote work. New policies had to be established and quickly implemented as employees were pushed out of the office and into isolation at the beginning of the pandemic. The remote aspect, connecting to the company’s network from afar, is rife with risks.
According to CyberEdge Group’s survey1 on the fallout from the pandemic, 86% of organizations experienced an attack in 2020, which is up five percentage points from the year before. Nearly 70% of organizations surveyed reported ransomware events, and 57% of them actually paid a ransom. But paying a ransom doesn’t always result in a return to normalcy, because 28% said they didn’t get their data back after paying up.
Remote work increased by more than 110% in 2020, and bring-your-own-device-to-work (BYOD) policy adoption went up by nearly 60%. For those who got hit hardest by cyber criminals, a failure to adopt policies to strengthen security was likely a part of what made them vulnerable to an attack.
Cloud-Based Security
Organizations have adopted cloud-based solutions for years, but the pandemic saw a 5% increase in new cloud-based security adoption. Interestingly, the CyberEdge survey found that 75% of IT security professionals boosted their existing cloud-based security platforms to gain extra protection.
IT security challenges are always prevalent, but with the pandemic and resulting complexities, most security teams found themselves spending more on solutions to bolster preventative measures. The expectation is that spending will slow in 2021; however, it’s entirely possible that the trend to bring in improved firewalls, biometrics, security management operations, and bot management will continue to be on security teams’ wish list.
Spotting a Weakness
Part of the reason the BYOD policies are such a hot topic is that mobile devices are among the weakest links in any organization’s network. Making employees accountable for what they use to connect to the company network involves an education component, arming them with information they can use to spot suspicious activity.
Other weak spots include internet of things (IoT) devices and industrial control systems. IoT devices can be particularly difficult to keep track of, which is why careful planning and auditing is a requirement in today’s risky environment.
Partner With a Trusted Agent
Confusion comes easy when trying to adopt the right solutions to keep your data safe. To reduce the IT system challenges you face on a daily basis, consider partnering with an agent knowledgeable of all the solutions available today. They can assist in making sure the devices you adopt will integrate with current systems, protect you in a customizable fashion, and stay within your budget.
At eXemplify, we know about all the best cloud-based security options out there today and we’re uniquely qualified to connect you with the solutions that will reduce your security risks. Contact us and let’s discuss your needs.
Sources: