It's not if you will be hacked - but when! How much can you afford to lose?
- From 1996 – 2006, annual vulnerability disclosures grew from <100 to nearly 7,000[i]
- Mobile malware grew 614% between March 2012 and March 2013[ii]
- 97% of organizations have experienced malware attacks[iii]
- Over ONE BILLION records with personally identifiable information were leaked or stolen in 2014![iv]
We all know that digital information is growing exponentially! According to Gartner, the volume of data you store will grow eightfold in just five years. How do you protect yourself and your organisational assets?
Given the shift to more mobile workplaces, where colleagues use their own devices to perform work-related tasks, often that data is far less contained than in the past. The Ponemon Institute found that over a third of employees exclusively use mobile devices to do their work. Couple that with the 61% of organisations who report that mobile devises have increased employee productivity, there is no turning back to a traditional desktop model.
Yet, most organisations experiencing productivity gains offset by a growing mobile risk profile. Approximately 52% reported that security practices on mobile devices have been sacrificed in order to improve employee productivity. More alarmingly, 30% of organisations still have absolutely no security features in place to support mobility![v]
Today’s organisations don’t only face a greater volume of attacks. Those incidents are changing in nature, becoming more coordinated and far more targeted at essential assets like customer databases, IP and even connected physical assets. Keeping track, ensuring compliance and countering threats becomes an even more complex task. As highlighted in the November 2014 Sony Pictures Entertainment hack, the nature of hacking and cybercrime is changing. Hacking is not restricted to the loner, but is carried out by large, sophisticated networks of individuals.
Fortunately, there are software options that provide a unified architecture to integrate security information and event management (SIEM), so that you can keep track painlessly. With the right security technology, cloud infrastructure actually provides organisations with a unique opportunity to enhance security. In fact, cloud-based security can be more automated, customisable and elastic than traditional perimeter defences and static point products.
A SIEM technology using both security analytics and forensics tools provide the increased capabilities to reduce false positives. With an every growing number of incidents the response team needs to prioritise and resolve the real threats in minutes. QRadar is the number one rated option for its ability to execute unified security and the completeness of vision, providing:
- Advanced threat detection
- Log management
- Anomaly detection
- Incident forensics
- Vulnerability management
- High risk detection in near real time
- High priority incident detection
- Full visibility of network, application and user activity
- Automated regulatory compliance
And there is more good news
- If a security incident can be resolved in less than 60 seconds, the remediation costs could be reduced by as much as 40%[vi]
- 72% of converts to QRadar from other SIEM providers say the detection rate has increased or significantly increased as a result of the switch to QRadar[vii]
Vintek is South Australia’s only accredited IBM® QRadar® Security Intelligence Platform expert. Don’t be one of the 83% of organisations struggling to find the security skills they need.[viii]
Talk to Vintek to learn more about mitigating your organisational securing risks on 1300 001 337.
[i] IBM X-Force Threat Intelligence Quarterly 1Q 2014
[ii] Juniper 2013 Mobile Threat Report
[iii] What’s behind a cyber attack?, April 2014
[v] Security in the New Mobile EcoSystem, http://dc.ubm-us.com/i/427079-023-mustread/3
[vi] Data Capture and Network Forensics, State-of-the-Market: IBM Security QRadar Incident, Forensics vs. Other Industry Tools
[vii] IBM QRadar Security Intelligence: Evidence of Value
[viii] 2012 ESG Research