Skip to content

Advanced Technological Upgrades Eradicate Potential Security Threats, According to Study

Forward-thriving businesses consistently outmaneuver malicious entities, secure valuable workforce, and gather backing from senior corporate leaders.

Technology advancements proactively avert security catastrophes, according to a recent study
Technology advancements proactively avert security catastrophes, according to a recent study

Advanced Technological Upgrades Eradicate Potential Security Threats, According to Study

=====================================================================

A new report from Cisco, conducted by YouGov and analyzed by The Cyentia Institute, sheds light on the security practices that lead to the best outcomes for major companies. The report, which surveyed over 4,800 IT, security, and privacy professionals in 25 countries, focuses on 11 high-level security outcomes, organized under three top objectives: enabling the business, managing risk, and operating an efficient organization.

According to the report, companies that achieve higher success in multiple security aspects with proactive technology updates typically implement AI-driven security tools, Zero Trust security frameworks, continuous threat monitoring, regular automated software updates, multi-factor authentication (MFA), strong password management, and cybersecurity digital twins for simulating and validating IT environments to anticipate attacker behavior and optimize defenses proactively.

Wendy Nather, Advisory CISO at Cisco, stated that companies that proactively refresh their technology also reported high levels of success in a wide variety of security outcomes. However, the report does not provide a comparison between upgrading from one operating system to another and maintaining patches in the current version. Nather also questioned the difference between these two approaches and suggested that it might be beneficial to investigate if refreshing certain types of IT or security infrastructure has a greater impact on security outcomes.

An after-action report, when executed correctly, can identify problems in knowledge, procedures, technology, and business roles, according to the report. Addressing the issues identified in an after-action report can not only prevent the breach from happening again but also improve response time and lower costs overall. The study did not specify which particular technologies enterprises were refreshing, providing an opportunity for further research.

Other important factors for success in security strategies, according to the report, include having a well-integrated technology stack and recruiting and retaining top security talent. Nather also asked if better outcomes are observed when user devices are refreshed compared to keeping databases up-to-date, but the report does not provide information on this matter.

The report emphasizes the importance of using after-action reports effectively to recover from major data breaches and prevent future occurrences. It aims to identify the security practices that lead to the best outcomes for major companies and encourages enterprises to adopt proactive technology refresh strategies to enhance their overall security posture.

Read also:

Latest