Siloed Enterprise Environment Exposes Security Risk From The Start

Date : 21-Jul-2020
Location: Singapore

  • VMware,software powers the world’s complex digital infrastructure
  • VMware and Carbon Black are registered trademarks or trademarks of VMware.

Key Takeaways:
  • VMware today released the results of its third Singapore-focused cybersecurity threat report entitled, “Extended Enterprise Under Threat,” based on a survey of 251 Singaporean CIOs, CTOs and CISOs.
  • The research found that the threat landscape appears to have plateaued and attack frequency and sophistication have lessened during the past 12 months in Singapore. However, this has still prompted continued investment in cyber defense, with Singaporean businesses already using an average of more than eleven different cybersecurity tools.
  • Data for the report was compiled in March and April 2020 by an independent research company, Opinion Matters, on behalf of VMware Carbon Black.

Rick McElroy, Cyber Security Strategist at VMware Carbon Black, said,evidence shows that attackers have the upper hand when security is not an intrinsic feature of the environment.

  • 43% said attack volumes have increased in the last 12 months.
  • OS vulnerabilities (20%) were the leading cause of breaches, according to the survey, followed by third party applications breaches and web application attacks.
  • Singaporean companies said they are using an average of 11 different security technologies to manage their security program, the survey found.
  • 93% of Singaporean cybersecurity professionals said attack volumes have increased as more employees work from home. 90% said their organizations have experienced cyberattacks linked to COVID-19 malware
Best Practices:
  • Security teams must be working in tandem with business leaders to shift the balance of power from attackers to defenders.
  • Management to collaborate with IT teams and work to remove the complexity.
  • Build security intrinsically into the fabric of the enterprise – across applications, clouds and devices.

Complicated enterprise IT environment
Photo by Kevin Ku on Unsplash