Why Executives Need to Prioritise Cybersecurity

In spite of the headline-making hacks of Sony, Anthem, and many other organisations, many business executives still haven’t prioritised cybersecurity as a top concern.

A 2015 NTT Com Security survey showed that half of its participants were not prepared for a cyber attack. Yet hacks are becoming more frequent, and hackers are taking more creative approaches and finding more opportunities to strike. Executives that neglect cybersecurity place their companies at greater risk of a data breach.

The survey, which interviewed 1,000 business executives, revealed some alarming findings. First, only 54% viewed information security as "vital" to their business, and 56% of the participants could not guarantee full protection of their sensitive data. And 34% admitted they spend more money on marketing than on cybersecurity. These statistics show the lamentable reality that today's businesses are ill-equipped for defense against digital threats.
 
Executives regrettably have a sense of fatalism about hacks: 25% of the interviewees believed their company would suffer a data hack in the future. But these executives may not be aware that current cybersecurity technology provides powerful security against hackers and insider threats. With solutions such as network security monitoring and SIEM, companies will no longer be vulnerable to cyber attacks.

Since executives are busy with other responsibilities to attend to, it's easy for them to neglect cybersecurity, especially given the difficulties of understanding the subject matter. Top management may prefer dealing with data breaches after they happen rather than take a preventative approach because it seems simpler to do. Yet a reactive posture means that the damage is already done.

Failing to prioritize cybersecurity is almost certain to lead to expensive and embarrassing consequences. The average cost of resolving a cyber incident, according to a 2015 Ponemon Institute survey, was $15 million—a far more substantial price to pay than taking proactive measures to prevent such risks.
 
Of course, appearing in the media as a hack victim can also have negative repercussions for businesses. Customers lose trust in companies that show they can't protect sensitive data like credit card information, and will likely take their business elsewhere or worse, choose to take legal action.

Traditionally, executives hired IT staff to handle cybersecurity matters, but it's a complex issue that an in-house team may not be able to take care of on their own. An affordable option, particularly ideal for SMEs, is to supplement in-house teams with an outsourced managed security service.
 
Instead of hiring additional expensive personnel, businesses can engage with qualified external experts to provide 24/7 network security monitoring year-round. Along with vulnerability management and remediation guidance, network security monitoring is a core function of SOCVue and EiQ's managed security service.

With SOCVue, businesses can stop procrastinating on cybersecurity and avoid costly breaches in the future.

EIQ Networks

 

« Big Data: The 4 Layers Everyone Must Know
NSA Using The Cloud To Thwart The Next Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.