Building a slide deck, pitch, or presentation? Here are the big takeaways:
- 48% of companies have experienced at least one data breach in the past two years. — ServiceNow and Ponemon Institute, 2018
- 64% of respondents say that they plan to hire additional dedicated resources for vulnerability response over the next year. — ServiceNow and Ponemon Institute, 2018
Nearly half of enterprises experienced at least one data breach in the past two years, according to a Thursday report from ServiceNow and the Ponemon Institute. As cyber threats grow in number and sophistication, many companies are looking to high-demand cybersecurity professionals to protect their data. However, enterprises fail to consider that hiring more people does not necessarily lead to better cybersecurity, the report noted.
The report examined the "patching paradox"—the idea that security teams that hire more staff for vulnerability response won't improve their security posture if they don't fix broken patching processes first.
Cybersecurity teams dedicate a large amount of time and resources to patching, the report found. In a survey of 3,000 enterprise cybersecurity professionals, the average cybersecurity headcount is 28 people. Companies spend an average of 321 hours per week managing the vulnerability response process—the equivalent of eight full time employees, or 29% of security resources. And this number is only expected to rise as threats grow more intense, the report noted.
SEE: Cybersecurity spotlight: The critical labor shortage (Tech Pro Research)
Due to this need, 64% of respondents said that they plan to hire additional dedicated resources for vulnerability response over the next year. The average number of people they plan to hire is four, the report found.
But with the global shortage of cybersecurity professionals set to reach 2 million by 2019, organizations will find it increasingly difficult to find the talent they need. As a result, more companies may look to automate security processes, the report noted.
The report included five recommendations for organizations to help build a roadmap to improved security practices:
1. Take an unbiased inventory of vulnerability response capabilities. Assess how your company detects vulnerabilities and how quickly it patches them.
2. Accelerate time-to-benefit by tackling low-hanging fruit first. Start with basic hygiene items that can be addressed quickly, such as scanning for vulnerabilities.
3. Break down data barriers between security and IT. Create a common view combining vulnerability and IT configuration data.
4. Define end-to-end vulnerability response processes, and then automate as much as possible.
5. Retain talent by focusing on culture and environment.
- 17 tips for protecting Windows computers and Macs from ransomware (free PDF) (TechRepublic)
- Cybersecurity report card: Why too many companies are graded 'could do better' (ZDNet)
- Cheat sheet: How to become a cybersecurity pro (TechRepublic)
- Improve your cybersecurity strategy: Do these 2 things (ZDNet)
- Why traveling CEOs and coffee shops are your company's greatest security risks (TechRepublic)
Alison DeNisco Rayome has nothing to disclose. She does not hold investments in the technology companies she covers.
Alison DeNisco Rayome is a Staff Writer for TechRepublic. She covers CXO, cybersecurity, and the convergence of tech and the workplace.