Skip navigation
Skip navigation
You are using an outdated browser. Please upgrade your browser.

Professionals working in IT are marking their companies down when it comes to their ability to prevent, detect and manage the consequences of a data breach, according to a Ponemon report on the impact of data breaches commissioned by Centrify, the leader in securing hybrid enterprises through the power of identity services.

The global study of IT professionals in the UK, US, Germany and Australia, shows that less than half of global IT professionals are confident they have the ability to prevent, detect and resolve data breaches. In the UK, however, the picture is even more damning, with 70 per cent of IT practitioners not confident in their ability to prevent breaches.

More worrying is the fact that for the majority (63%) of IT professionals, the biggest concern following a data breach is loss of their jobs, which ranks above loss of company reputation (43%) and time to recover decreasing productivity (41%). This is at a time when the industry is trying to cope with a worldwide shortage of qualified cybersecurity professionals. Non-profit information security group ISACA predicts there will be a global shortage of two million cybersecurity professionals by 2019.

According to the study, over half (51%) of UK IT practitioners in organisations that had suffered a data breach believe that one of the most negative consequences of a data breach is greater scrutiny of the capabilities of the IT department. This ranks above brand and reputational damage (35%) and loss of customer trust in the organisation (35%).

Forty per cent of IT professionals who took part in the study said their organisation had suffered a data breach involving sensitive customer or business information in the past two years.

“Organisations need to take a smarter approach to their security needs, implementing tools that are more efficient, consolidating vendors and platforms, and empowering the people within their IT departments,” says Andy Heather, VP EMEA at Centrify. “Now more than ever, cybersecurity requires C-suite involvement to ensure its IT department has the right tools to be successful and not just left on the hot seat to take the fall.

“For years now, organisations have relied on a well-defined boundary to protect their assets. They knew where the perimeters of their networks and endpoints were, and kept their important assets on the safe side. But things have changed. Today, the world as we know it is an increasingly complex digital canvas of identities that live in and out of the enterprise, changing the perimeter of the network — to no perimeter at all. Traditional security measures are failing to safeguard against breaches. To avoid financial and reputational ruin, organisations must now rethink their approach to security.”

Access to the UK Ponemon study: https://www.centrify.com/resources/the-impact-of-data-breach... or please request a PDF copy.

Notes to editors:

· According to Verizon, 80 per cent of breaches are due to compromised credentials, requiring organisations to address a very specific vulnerability. To address this, Centrify offers the only integrated platform designed to stop breaches through the trifecta of Identity Services for applications, endpoints and infrastructure—both on premises and in the cloud. Unlike other vendors that only address a subset of users, Centrify’s platform secures access for a company’s entire identityscape, including end users, partners, customers and privileged users—who are the most critical access management use case today.

· According to the Forrester study, organisations that reach the highest levels on the maturity scale are 50 per cent less likely to have a breach. In addition, these organisations save 40 per cent in security costs over their less mature counterparts, and spend $5 million less in breach costs. The study examined four levels of Identity Access Management (IAM) maturity. It found a direct correlation between the number of PIM best practices an organisation has implemented and the number of security incidents it encounters. Centrify’s new PIM capabilities enable these best practices, adding to Centrify’s already comprehensive set of integrated services that help organisations increase their IAM maturity level and security posture.

About Centrify
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. To learn more visit www.centrify.com.

The Breach Stops Here.

Media contact;
Amanda Hassall, Consultant
T: +44 (0) 16 2882 2741
M: +44 (0) 78 5535 9889
E: amanda@origincomms.com

This press release was distributed by ResponseSource Press Release Wire on behalf of Origin Comms Ltd in the following categories: Business & Finance, Education & Human Resources, Computing & Telecoms, for more information visit https://pressreleasewire.responsesource.com/about.