User Patterns: The Real Hole in Threat Detection
The ability to detect and prevent threats stands at the center of most organizations' security posture. Gartner recently announced that companies now see technology security and compliance as a strategic item, no longer relegated to the tactical. This is with good reason.
Average Security Breach: 263 Days Undetected!
The average breach goes 263 days before detection (no, that's not a misprint). That same breach (again, on average) costs a cool $3.5 million per incident based on lost revenue, productivity, remediation costs and penalties. Worldwide, this represents a $500 billion problem.
Given the gravity of the financial repercussions, companies are scrambling to pour money into preventive technology and compliant systems, process and procedures. It's hard for a CFO to say no these days to plugging a real or perceived gap in security. There's a hole that many are missing, however, and it's an area that is starting to move to the forefront of security conversations.
Trusted vs. Untrusted
We've all heard the story of the HVAC technician's admin password being stolen and used. There are countless other breaches just like this one. How to stop it? Typical procedures and process include better management of subcontractors and more rigid password expiration policies. But that really is just the tip of the iceberg.
Eighty percent of incursions happen using regular, generic IT tools and a stolen password. Smaller companies that work with larger ones are used as a beachhead to gain access. What we need is much deeper investments and technology around predictive pattern analytics.
Consider this. Would you design a physical security system allowing ...
FREE Membership Required to View Full Content:
Joining MSDynamicsWorld.com gives you free, unlimited access to news, analysis, white papers, case studies, product brochures, and more. You can also receive periodic email newsletters with the latest relevant articles and content updates.
Learn more about us here