sb-eu logo
Story image

CompTIA reveals top cybersecurity trends following COVID-19

CompTIA has identified key themes and trends around cybersecurity practices following the COVID-19 pandemic and the move to remote working.

Overall, the events that have taken place the previous few months have thrown businesses plans into hyper speed, including for cybersecurity.

In addition, a key finding from CompTIA is that organisations are building confidence that their cybersecurity practices are headed in the right direction, aided by advanced technologies, more detailed processes, comprehensive education and specialised skills.

In fact, eight in 10 organisations surveyed for CompTIA’s State of Cybersecurity 2020 report said their cybersecurity practices are improving.

At the same time, many companies acknowledge that there is still more to do to make their security posture even more robust.

Growing concerns about the number, scale and variety of cyberattacks, privacy considerations, a greater reliance on data and regulatory compliance are among the issues that have the attention of business and IT leaders.

CompTIA senior director for technology analysis Seth Robinson says, “The COVID-19 pandemic has been the primary trigger for revisiting security. The massive shift to remote work exposed vulnerabilities in workforce knowledge and connectivity, while phishing emails preyed on new health concerns.”

Robinson noted that the pandemic accelerated changes that were underway in many organisations that were undergoing the digital transformation of their business operations.

He says, “This transformation elevated cybersecurity from an element within IT operations to an overarching business concern that demands executive-level attention. It has become a critical business function, on par with a company’s financial procedures.”

As a result, companies have a better understanding of what to do about cybersecurity, CompTIA says. Nine in 10 organisations said their cybersecurity processes have become more formal and more critical.

Two examples are risk management, where companies assess their data and their systems to determine the level of security that each requires; and monitoring and measurement, where security efforts are continually tracked and new metrics are established to tie security activity to business objectives.

CompTIA also highlights how the ‘cybersecurity chain’ has expanded to include upper management, boards of directors, business units and outside firms in addition to IT personnel in conversations and decisions.

Within IT teams, foundational skills such as network and endpoint security have been paired with new skills, including identity management and application security, that have become more important as cloud and mobility have taken hold.

On the horizon, CompTIA says it expects to see skills related to security monitoring and other proactive tactics gain a bigger foothold. Examples include data analysis, threat knowledge and understanding the regulatory landscape.

Cybersecurity insurance is another emerging area. The report reveals that 45% of large companies, 41% of mid-sized firms and 37% of small businesses currently have a cyber insurance policy.

Common coverage areas include the cost of restoring data (56% of policy holders), the cost of finding the root cause of a breach (47%), coverage for third-party incidents (43%) and response to ransomware (42%).

Story image
Covid-19 sees rapid cloud adoption, rise in double-extortion ransomware
“We need to act now to stop this cyber pandemic spreading out of control."More
Story image
ExtraHop reveals methods used by attackers in SUNBURST breach
The network detection and response company says between late March and early October 2020, detections of probable malicious activity increased by approximately 150%, including detections of lateral movement, privilege escalation and command and control beaconing.More
Story image
Endace and Corelight step in to enhance incident response workflows
Endace and Corelight have entered into a strategic partnership to deliver security teams with insights and detailed forensic data to further enable rapid incident response.More
Story image
Cyber-risk to critical infrastructure reaches all-time high — report
New research from Nozomi Networks Labs found that attackers are doubling down on high-value targets and weaponising the software supply chain.More
Story image
Ping Identity launches new verification service to reduce fraud
PingOne Verify is a new cloud service designed to help enterprise customers to verify their identity for rapid account onboarding, authentication and fraud prevention.More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More