Firms ‘failing to follow own best practices’, research finds
The majority of businesses in the UK could be putting their networks at risk because they are not following their own best practices, it has been claimed.
A new study by ESET and Kingston Digital revealed there is a large disconnect between IT teams that put in place guidelines to ensure systems are protected and the business units and employees that are expected to follow these plans.
Overall, it revealed as many as seven out of ten firms are failing to take the necessary steps to ensure they do not fall victim to a data breach.
One particular area of concern is how employees connect external devices to their network, as nearly half of firms are not taking adequate precautions to secure removable gadgets when they are connected.
For example, 44 per cent of businesses admitted they do not secure devices such as USB sticks using antivirus software, which means their IT systems could be exposed to cybersecurity risks and the potential for large fines from GDPR and other regulations.
This may be an increasingly important consideration for many firms as the number of connected devices attached to their network grows. In addition to USB devices and mobile gadgets such as smartphones, a range of Internet of Things tools, from printers to environmental sensors, will be added to firms' IT estates in the coming years, and many of these may be easy targets for hackers.
Cybersecurity specialist at ESET Jake Moore said that while it is positive that British businesses have taken the first steps by putting in place best practice policies, they need to move beyond this.
"Putting together the best practice guidelines is, of course, the first step. However, more needs to be done," he said. "IT teams must work closely with other departments to ensure employees are following the guidelines on a day-to-day basis and they have the right tools to protect their work and the entire organisation."
Mr Moore added that all it may take to bring down an entire IT network is one infected device. "When it comes to security, companies need to be 100 per cent secure and recognise that there is no room for error."
Share This Post, Choose Your Platform!
With over 25 years in the business telecoms industry and an unrivalled reputation of delivering excellent, personal customer service, Arrow is one of very few companies in the UK able to provide a full telecoms, IT and energy consultancy and service proposition.
Savings through automation, scale, improved service. We’ve got that covered. But the true value comes with empathy, through empowerment, collaboration. It’s connecting people that drives us forward. It’s people that make tomorrow happen.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.