Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Information security – Global Threat Report finds insider attacks are on the rise

3/05/2016 by Sharon Shahzad

W1siziisijiwmtyvmduvmdmvmtevndivntqvnjkyl1nly3vyaxr5lmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

According to the latest Global Threat Report published by Forcepoint, enterprises need to allocate more resources to tackle the on-going spectre of threats and attacks from within the organisation. The whitepaper noted that less than half of corporations have a dedicated budget to tackle insider threats, despite their potentially catastrophic impact on business continuity.

Forcepoint’s 2016 study aims to provide a definitive breakdown on the cybersecurity threats attacks and hacks facing enterprises in today’s increasingly connected and digital landscape. “The rapid evolution of the cyber threat environment has consequences that are much broader than just technical, operational, and financial – they can impact every piece of a business,” Forcepoint Chief Scientist, Dr Richard Ford said. “With this threat report, we want to demystify these threats and help enable businesses with tools, recommendations and, quite simply, knowledge, so they can continue to move forward without fear.”

It found that many businesses feel they are still unprepared to confront the threat posed from sources within the organisation. Hackers are now taking advantage of dynamic business relationships and supply chains by manipulating staff to perform tasks that appear to be legitimate, but are actually designed to steal credentials and other important information. CIOs said common challenges are the lack of contextual information to flag suspect activity and an inability to view overall behaviour on networks. However, new technology is now emerging that combines DLP and analytics to determine the true origins of insider threats.

Forcepoint analysed a staggering three billion individual data points per day in more than 150 countries around the world throughout its research. The report revealed that the rise of ransomware and malware during the last twelve months had led to a 250 per cent rise in the number of emails with malicious content. It also detailed the arrival of a new botnet campaign called Jaku, which works on a large scale and an individual level to harvest sensitive files and valuable machine information.

Forcepoint rounded out its threat study by looking at the on-going move to the cloud and its potential impact on security. While those that adopt SaaS and other cloud methods wholesale for improved scalability and accessibility are reaping the benefits, CIOs that have yet to embrace the cloud are struggling to cope with the consequences of “shadow” IT. This is when employees are making independent decisions to use cloud apps for convenience and productivity. Shadow IT poses severe consequences, as both IT and security cannot see the data and thus are unable to protect it.

About Us

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...

W1siziisijiwmtcvmdkvmdgvmtevmtuvmzqvmtgwl0hpcmluzybnaxn0ywtlcy5qcgcixsxbinailcj0ahvtyiisijm4mhgxmdajil1d

Common Hiring Mistakes for SAP Consultants

2017-09-08 12:00:00 +0100

Choosing the wrong consultant can lead a project down a ruinous path. Deadlines get missed, quality of work decreases and money is wasted. When you're putting together a new SAP project, getting the right talent is paramount. We discussed hiring mistakes with our Senior Business Manager, Adam Blaney and asked him the question of how to minimise risk in hiring SAP Consultants. “Hiring any form of technology based consultant is difficult. The hardest part...