Reports confirm that businesses in the UK are flabbergasted about solving the issue of cyber attacks which is indeed a global issue. UK firms are said to be in the dark about what they should do to solve the problem as they just cannot build the resilience required to withstand these attacks.
A study that looked into the state of things in that country said that UK firms still have a long way to go in building the right resilience required to tackle the cyber threats issues and also the other major disruptions that are created.
Most business leaders in the UK believes that their businesses ought to be insulated against cyber attacks but just about half of these executive claim their organizations are up to task in fighting this menace. This fact was revealed in a recent study.
Though the security industry has over the years come to realize the importance of focusing on resilience to ensure that when defences are breached, organizations are able to minimize the impact on business, it can’t really be established just how much they are communicating this message to firms.
Security firm named Tanium made a short poll and came to realize that quite a number of firms cannot even sum up the indirect cost from lost revenue and productivity after a breach.
There are many barriers to achieving resilience. So, even though business leaders know that the building of resilience against attack is key, making sure they develop the resilience will mean putting up much effort in achieving their aim.
Part of the problem is that hackers are forward looking and are often smarter than IT teams. They go several steps forward while the IT teams follow them behind. This can also mean that these teams do not have the capability to discern security breaches suddenly as it happens.
Digital transformation is at break-neck speed. Organizations are also always chasing the best security products that may become obsolete as soon as they purchase them. This leaves IT infrastructures vulnerable to threats.
To do better, organizations need to identify where threats are likely to occur and be very familiar with endpoints. They must be able to pinpoint origin of threat so that they can defend against them.