Why Executives Need to Prioritise Cybersecurity

In spite of the headline-making hacks of Sony, Anthem, and many other organisations, many business executives still haven’t prioritised cybersecurity as a top concern.

A 2015 NTT Com Security survey showed that half of its participants were not prepared for a cyber attack. Yet hacks are becoming more frequent, and hackers are taking more creative approaches and finding more opportunities to strike. Executives that neglect cybersecurity place their companies at greater risk of a data breach.

The survey, which interviewed 1,000 business executives, revealed some alarming findings. First, only 54% viewed information security as "vital" to their business, and 56% of the participants could not guarantee full protection of their sensitive data. And 34% admitted they spend more money on marketing than on cybersecurity. These statistics show the lamentable reality that today's businesses are ill-equipped for defense against digital threats.
 
Executives regrettably have a sense of fatalism about hacks: 25% of the interviewees believed their company would suffer a data hack in the future. But these executives may not be aware that current cybersecurity technology provides powerful security against hackers and insider threats. With solutions such as network security monitoring and SIEM, companies will no longer be vulnerable to cyber attacks.

Since executives are busy with other responsibilities to attend to, it's easy for them to neglect cybersecurity, especially given the difficulties of understanding the subject matter. Top management may prefer dealing with data breaches after they happen rather than take a preventative approach because it seems simpler to do. Yet a reactive posture means that the damage is already done.

Failing to prioritize cybersecurity is almost certain to lead to expensive and embarrassing consequences. The average cost of resolving a cyber incident, according to a 2015 Ponemon Institute survey, was $15 million—a far more substantial price to pay than taking proactive measures to prevent such risks.
 
Of course, appearing in the media as a hack victim can also have negative repercussions for businesses. Customers lose trust in companies that show they can't protect sensitive data like credit card information, and will likely take their business elsewhere or worse, choose to take legal action.

Traditionally, executives hired IT staff to handle cybersecurity matters, but it's a complex issue that an in-house team may not be able to take care of on their own. An affordable option, particularly ideal for SMEs, is to supplement in-house teams with an outsourced managed security service.
 
Instead of hiring additional expensive personnel, businesses can engage with qualified external experts to provide 24/7 network security monitoring year-round. Along with vulnerability management and remediation guidance, network security monitoring is a core function of SOCVue and EiQ's managed security service.

With SOCVue, businesses can stop procrastinating on cybersecurity and avoid costly breaches in the future.

EIQ Networks

 

« Big Data: The 4 Layers Everyone Must Know
NSA Using The Cloud To Thwart The Next Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.