Saturday, July 4, 04:21
Home security Businesses: Developing many security tools hides risks!

Businesses: Developing many security tools hides risks!

Businesses, in an effort to respond promptly and effectively to cyber security incidents, are investing in too many tools, which can negatively affect the effectiveness of their defense. A few days ago, IBM published the results of a global survey conducted by Ponemon Institute, including responses from about 4.000 people from around the world working in its field security and information technology. According to the survey, while businesses are investing and programming, efficiency does not reach the desired levels, as business efforts are hampered by the complexity caused by fragmented tools. The fifth annual IBM Cyber ​​Resilient Organization report notes that while businesses are improving their design, detection and response to cyberattacks, their ability to contain an active threat has been reduced by 13%.


Businesses develop an average of 45 cybersecurity-related tools in cyberspace networks their. However, the use of a large number of tools can contribute to the inability of a company to not only detect an active attack, but also to defend itself against it.
Businesses with more than 50 tools ranked 8% lower in their ability to detect threats and 7% lower in their defenses. possibilities, compared to those who use fewer tools.

Undoubtedly, the field of cybersecurity has evolved and reached a new level, with 26% of respondents stating that their companies have now adopted official corporate security plans. In addition, among those who have adopted a response plan to incidents security, only a third have created a playbook for common types attack to be careful. According to the research, because each type of attack requires a different response technique, the existence of predefined playbooks provides companies with consistent and repetitive action plans for the most common attacks, which they are likely to face.

business tools

IBM said the lack of planning and testing to deal with such incidents could cost up to $ 1,2 million more than a cyberattack would cost a victim company.

In the light of his pandemic COVID-19 and the rapid changes that many have experienced in their workplaces, the plans and tools for responding to such attacks should be reconsidered. It is worth noting that only 7% of respondents evaluate these plans every quarter, while 40% have not set a time period for evaluation and review.

IBM said that as business activities change rapidly due to the fact that more and more employees are working remotely, but also because new attack techniques are constantly appearing, these data suggest that many businesses rely on outdated response plans that do not reflect the current threat and the existing business landscape.


Please enter your comment!
Please enter your name here

Every accomplishment starts with the decision to try.


Avaddon ransomware: Attacks through Excel 4.0 macros

Microsoft announced yesterday that Avaddon ransomware spread this week through an old technique that came to the fore again. The...

Apple: Prohibits updating Chinese Apps without permission

Apple is banning developers from updating existing apps in China's App Store if they don't have government approval.

Australia: Thousands of MyGov accounts are sold on the Dark Web

Access to more than 3600 MyGov accounts is being sold on the dark web, potentially exposing thousands of Australians to fraud and identity theft.

Party Time: Watch TV with your friends online

Party Time: Watch TV with your friends on the internet Time for a different party than you are used to, watching your favorite ...

CISA and FBI warn businesses of Tor's risks

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning to businesses regarding ...

openSUSE: The new Leap 15.2 hard drive has been released

Recently, the next stable version of the openSUSE operating system was released. According to the development team of the operating system, ...

What are the most popular types of malware?

Researchers are looking for the most common types of malware. During the investigation of the malicious activities, the researchers in cyberspace focus ...

REvil ransomware: Target the Light SA electricity company

The operators of REvil ransomware (also known as Sodinokibi) violated the Brazilian electricity company Light SA ...

LinkedIn: Our bug is due to an iOS problem

A representative of LinkedIn told ZDNet yesterday that an error in the iOS application was responsible for a seemingly "interfering behavior" that ...

Valak Info Stealer targets businesses in Europe and America

Many businesses in North and South America, but also in Europe, have fallen victim to the infamous Valak Info Stealer.