Almost two-thirds of respondents have experienced intrusions into their networks in the past 18 months
As a CISO, Hanson also finds it striking that 61% of respondents reported having had their networks breached in the last 18 months: “I expected the percentage of companies impacted to be high, but I didn’t expect more than half to have been impacted in such a short period of time. It’s a tough job protecting your company’s information. It’s important to focus not only on preventing breaches, but also on detecting them and having full visibility. Being secure doesn’t mean bad things will happen. When they do, you want to be able to get things back to where they were by using tools and services to provide visibility and recovery.”
what’s happening in the industry and in their organizations,” he says. “They must be serious about training their people and turning them into data advocates.”
As Code42 research has shown, three-quarters of CISOs hungary mobile database they can improve their security strategies by combining intrusion prevention and data recovery. In other words, they recognize that strategies need to change.
According to Hanson, CISOs should use the following best practices on a daily basis:
Take a proactive approach to data security, starting with hiring employees and defining their responsibilities. If they have to be fired for failing to meet their responsibilities, learn from these cases and use them without mentioning names in the ongoing training of your subordinates;
If an employee submits a resignation letter, thank them for their work. Talk to them, express your trust, remind them of the need to follow company policy, and offer to sign a document outlining the company's intellectual property rights and their obligations to protect them;
In terms of technology, have a solution that provides real-time visibility into how data moves across the network by identifying all types of files being transferred from a specific device, who is transferring them, when and where;
Investigate all alarms promptly. Share the information with your employees. It doesn't matter whether it was an attempt to penetrate the network by an intruder or not. You are simply protecting intellectual property.
CISOs “must be proactive about
-
- Posts: 549
- Joined: Mon Dec 23, 2024 3:15 am