Why Executives Need to Prioritise Cybersecurity

In spite of the headline-making hacks of Sony, Anthem, and many other organisations, many business executives still haven’t prioritised cybersecurity as a top concern.

A 2015 NTT Com Security survey showed that half of its participants were not prepared for a cyber attack. Yet hacks are becoming more frequent, and hackers are taking more creative approaches and finding more opportunities to strike. Executives that neglect cybersecurity place their companies at greater risk of a data breach.

The survey, which interviewed 1,000 business executives, revealed some alarming findings. First, only 54% viewed information security as "vital" to their business, and 56% of the participants could not guarantee full protection of their sensitive data. And 34% admitted they spend more money on marketing than on cybersecurity. These statistics show the lamentable reality that today's businesses are ill-equipped for defense against digital threats.
 
Executives regrettably have a sense of fatalism about hacks: 25% of the interviewees believed their company would suffer a data hack in the future. But these executives may not be aware that current cybersecurity technology provides powerful security against hackers and insider threats. With solutions such as network security monitoring and SIEM, companies will no longer be vulnerable to cyber attacks.

Since executives are busy with other responsibilities to attend to, it's easy for them to neglect cybersecurity, especially given the difficulties of understanding the subject matter. Top management may prefer dealing with data breaches after they happen rather than take a preventative approach because it seems simpler to do. Yet a reactive posture means that the damage is already done.

Failing to prioritize cybersecurity is almost certain to lead to expensive and embarrassing consequences. The average cost of resolving a cyber incident, according to a 2015 Ponemon Institute survey, was $15 million—a far more substantial price to pay than taking proactive measures to prevent such risks.
 
Of course, appearing in the media as a hack victim can also have negative repercussions for businesses. Customers lose trust in companies that show they can't protect sensitive data like credit card information, and will likely take their business elsewhere or worse, choose to take legal action.

Traditionally, executives hired IT staff to handle cybersecurity matters, but it's a complex issue that an in-house team may not be able to take care of on their own. An affordable option, particularly ideal for SMEs, is to supplement in-house teams with an outsourced managed security service.
 
Instead of hiring additional expensive personnel, businesses can engage with qualified external experts to provide 24/7 network security monitoring year-round. Along with vulnerability management and remediation guidance, network security monitoring is a core function of SOCVue and EiQ's managed security service.

With SOCVue, businesses can stop procrastinating on cybersecurity and avoid costly breaches in the future.

EIQ Networks

 

« Big Data: The 4 Layers Everyone Must Know
NSA Using The Cloud To Thwart The Next Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.