What if organizations could react to cyber attacks with an automated defense? If they could take control of their privileged accounts it would reduce the attacker’s surface for compromise.
IT security survey
The survey revealed, to no great surprise, that the majority (74%) of IT professionals work unpaid overtime each week. However, 34% reported working an average of more than 15 extra hours a week.
If the cloud becomes the primary data center, will there even be a need for a traditional IT department? A third (33%) of nearly 140 IT pros polled thought that the cloud will be the end of the traditional IT team.
43% of respondents admitted they do not change their credentials in the cloud as frequently as they do on premises.
Changing user passwords on a regular basis has long been a basic – and well known – tenet of IT security. But when it comes to password security, privileged passwords (admin, root and such) are often overlooked.
Many of these breached companies passed their regulatory compliance audits and invested heavily in conventional perimeter security tools – like firewalls – without success. Spear phishing, zero days and other advanced threats were able to defeat their perimeter security.
IT professionals warn their management about looming IT security disasters, but say it’s the executives who fail to take action.
According to Symantec Research Labs, zero day exploits persist in networks for 312 days on average before being discovered. And it’s no wonder – nearly one out of three IT professionals are not confident that their IT teams could detect a cyber intrusion on their network.
These survey results seem to show that it doesn’t matter how many people you have guarding your network. Persistent hackers will always find a way in.
59% of IT security pros expect their network to come under attack in the near future. Digging deeper into the data we discovered this: among those who expect to be attacked, 44% are not confident they can detect an attacker attempting to breach their network and extract data.