• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Siloed Tech Prompts Security Worries

You are here: Home / General Cyber Security News / Siloed Tech Prompts Security Worries
April 26, 2022

IT leaders are worried that employing a number of technology management techniques could improve security blind spots and cyber risk, in accordance to new analysis.

A snapshot survey, conducted in January 2022 by Gatepoint Research and funded by Company Technology Management (ETM) alternatives provider Oomnitza, questioned IT leaders from 100 enterprises of far more than 5000 staff members across industries in the United States. 

The Tech Blind Places Study determined that even though 76% of enterprises are utilizing numerous techniques to find stock information about different technologies, 71% anticipate elevated security breaches and linked expenditures.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


IT leaders have been uncovered to have operational issues involved with siloed technology management, chief of which have been non-protected and missing endpoints, unaccounted for or incorrect info on belongings and very poor visibility into asset standing. They have been also concerned about overspending on application and cloud resources and the prospective effect of this kind of a management method on compliance adherence.

Questioned about their computer software as a company (SaaS) oversight, a quarter of IT leaders mentioned their business makes use of a lot more than 100 SaaS programs. About a sixth of IT leaders (15%) claimed that their company makes use of a lot more than 200 SaaS purposes.

Reporting on the business enterprise effects of their enterprise’s tech administration set up, study respondents mentioned revenue was squandered on application licenses or cloud expert services and time was dropped monitoring down asset standing/particulars. Unaccounted assets, delays onboarding/offboarding staff and compliance audit fines and exposure led to the squandering of further more investing.

Much more than half (52%) of IT leaders said that they intend to choose corrective action for technology management this calendar year. A couple (11%) have currently set jobs to realize this intention in movement.

Describing the administration capabilities they sought after, IT leaders cited unified technology look at and information, complete asset discovery and monitoring, security policy enforcement and lifecycle approach automation, and mechanisms to make improvements to employee expertise as critical regions of concentrate.

“The siloed and high priced methods company organizations handle their IT estate today are impacting IT provider shipping and delivery and pleasure, budgeting and audit efficacy, and attack surface management integrity,” said Arthur Lozinski, CEO and co-founder of Oomnitza. 

“The survey conclusions provide to elevate awareness of escalating enterprise technology management issues and how IT leaders are responding.”


Some parts of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «emotet testing new delivery ideas after microsoft disables vba macros Emotet Testing New Delivery Ideas After Microsoft Disables VBA Macros by Default

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Siloed Tech Prompts Security Worries
  • Emotet Testing New Delivery Ideas After Microsoft Disables VBA Macros by Default
  • Firms Push for CVE-Like Cloud Bug System
  • DDoS attacks surge to record numbers in 2022 as a result of Russia-Ukraine war
  • Microsoft’s secure VBA macro rules already being bypassed by hackers
  • The state of email security 2022
  • Russian-affiliates believed to be behind cyber attacks on wind turbines firms
  • Recommendations for managing AI risks
  • Gold Ulrick Hackers Still in Action Despite Massive Conti Ransomware Leak
  • AWS launches quantum random number generator

Copyright © TheCyberSecurity.News, All Rights Reserved.