View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

IT fragmentation leavng business vulnerable to hackers

As network diverges hackers are becoming smarter and more effective.

By Jimmy Nicholls

IT fragmentation is leaving businesses open to hackers as cyberattacks become ever more targeted, according to a report commissioned by Intel Security.

In a survey of security workers, 80% believed that a lack of integration and communication between disparate parts of the network was interfering with their ability to cope with attacks.

Jon Oltsik, senior principal analyst at the Enterprise Strategy Group which carried out the survey, said: "When it comes to incident detection and response, time has an ominous correlation to potential damage.

"The longer it takes an organization to identify, investigate and respond to a cyber-attack, the more likely it is that their actions won’t be enough to preclude a costly breach of sensitive data. With this in mind, CISOs should remember that collecting and processing attack data is a means toward action – improving threat detection and response effectiveness and efficiency."

Participants in the survey reported that they were averaging 78 security investigations during the last year, with a quarter involving targeted attacks in which the hacker profiles the victim in advance.

As such many of those questioned wanted better tools to combat the threats, with around half requiring better analytics tools, and a third desiring tools to work out what "normal" behaviour on a network was.

Others reported that expertise was a problem, with 40% calling for more training to improve knowledge and skills.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

"Just as the medical profession must deliver heart-attack patients to the hospital within a ‘golden hour’ to maximize likelihood of survival, the security industry must work towards reducing the time it takes organizations to detect and deflect attacks, before damage is inflicted," said Chris Young, general manager at Intel Security.

"This requires that we ask and answer tough questions on what is failing us, and evolve our thinking around how we do security."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU