New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

How are organizations protecting their critical IT assets?

New York Tech Editorial Team by New York Tech Editorial Team
November 24, 2021
in Cybersecurity
0
How are organizations protecting their critical IT assets?
Share on FacebookShare on Twitter

Telos unveiled findings from a research conducted by Vanson Bourne that explores how organizations approach network and critical IT asset protection.

critical IT asset protection

The study, which polled 250 information technology, IT security, legal and risk/fraud/compliance professionals, revealed that 99 percent of organizations believe an attack on their critical IT assets would have repercussions not just for their organizations, but for society at large.

Perhaps more concerning, 83 percent of respondents reported having experienced a successful cyber attack in the past two years, with half indicating the attackers managed to reach their critical IT assets.

The results suggest that, as the cyber threat landscape continues to grow in danger and complexity, organizations must take concerted steps to protect their IT networks. This is especially true when it comes to critical assets, in particular within banking, financial services and insurance; healthcare and life sciences; energy and utilities; K-12 education; and higher education sectors, where lost or stolen IT assets could result in devastating consequences for an organization, its customers and the wider society.

The state of critical IT asset protection

  • 99 percent believe they need to improve their ability to prevent an attacker from accessing critical assets once they have broken into the network.
  • 95 percent of those who have segmented and protected their critical IT assets believe that the assets are better protected as a result.
  • Yet, 93 percent believe the tools they are currently using to protect their segmented assets are insufficient to defend their organization against cyber threats.
  • 86 percent admitted to having been kept awake at night by concerns about the protection of critical IT assets.

“As hackers and threats continue to grow in sophistication, the importance of locking down critical IT assets is clearer than ever before, yet current security approaches are falling short in achieving that goal,” said Tom Badders, senior product manager at Telos.

“Now is the time for organizations to consider a different approach – and the best way to protect critical assets is to hide them entirely.”

Offering a path forward in today’s threat landscape, 99 percent of respondents who have been kept awake at night by concerns about the protection of critical IT assets agree that they would sleep better if they could hide their network assets by eliminating IP addresses, making them invisible on the public internet via network obfuscation.

In fact, 36 percent of organizations are very concerned that their organization will experience an attack on its critical IT assets in the next 6 months; however, among those using network obfuscation tools, this drops to 24 percent.

Credit: Source link

Previous Post

Boxcryptor protects business data in Microsoft Teams with end-to-end encryption features

Next Post

The Tolkien estate has smote JRR Token — but the NFTs persist

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
The Tolkien estate has smote JRR Token — but the NFTs persist

The Tolkien estate has smote JRR Token — but the NFTs persist

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
TigerData team

PostgreSQL Reimagined: How TigerData Is Turning a Legacy Database into the Backbone of AI and Real-Time Infrastructure

June 17, 2025
PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

June 12, 2025
Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

June 11, 2025
New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

June 9, 2025
New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025

Recommended

TigerData team

PostgreSQL Reimagined: How TigerData Is Turning a Legacy Database into the Backbone of AI and Real-Time Infrastructure

June 17, 2025
PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

PointFive Secures Spot on Redpoint’s InfraRed 100, Cementing Its Role in Cloud Infrastructure’s Next Era

June 12, 2025
Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

Alisha Outridge: Redrawing the Future of Tech, Leadership & Learning

June 11, 2025
New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

New Funding Backs Unibeam’s SIM-Driven Fix for Broken Authentication Systems

June 9, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media