One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8391350
Date de publication 2023-10-04 10:00:00 (vue: 2023-10-04 10:06:41)
Titre Le rôle de l'automatisation dans l'atténuation des risques de cybersécurité
The role of automation in mitigating cybersecurity risks
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Cyberattacks are on the rise around the globe. Recent data suggest that there are 2,200 cyberattacks every day and that the average cost of a data breach is $9.44 million. Of those cyberattacks, 92% are delivered via email in the form of malware and phishing. In 2022 alone, businesses reported 255 million phishing attacks with an average cost of $4.91 million. The sheer scale of cyberattacks today means that human intervention simply isn’t adequate. Instead, cybersecurity specialists must incorporate automation within their wider cybersecurity strategy. Automation can reduce the risk of human error, flag potential threats, and guard against security fatigue. Pros and cons of automation Businesses around the globe use automation to speed up their operational efficiency, decrease risk, and reduce workplace fatigue. This is particularly important in a field like cybersecurity, where constant vigilance and critical thinking are necessary to avoid costly data breaches. However, automation isn’t a silver bullet that eradicates the risk of a cyberattack. Even cutting-edge systems still need to be monitored and updated regularly. Failing to maintain systems may result in flawed security protocols or accidental shutdowns due to false threat detections. That said, the pros of automation far outweigh the cons. An effective automation program can free up staff and boost employee morale. When folks aren’t constantly stressed about threat detection, they can focus on fine-tuning threat intelligence and re-training employees. This minimizes the risk of security fatigue, which may otherwise lead to: Reduced attention during security training Unsafe password practices Ignored software updates Risky behavior online Mitigating security fatigue is in every IT department’s best interest, as failing to adhere to compliance regulations due to fatigue can be extremely costly.  Reducing the risk of human error Human error accounts for 88% of all data breaches. This troubling statistic highlights the vulnerability that employees pose and the importance of proper training in the workplace. Data collected by researchers from the University of Stanford found that: 45% of employees cite distraction as the reason why they fell victim to a phishing scam 57% of employees are more likely to be distracted when working from home 43% of respondents say they are most likely to open phishing emails that look legitimate Cloud-based automation systems can reduce the risk of human error and back up existing documents and data. This can help employees limit distraction and ensure that businesses remain operational following a breach. Automated threat detection software shuts down servers following a breach, but employees can still access important files when working on the cloud. Companies looking to reduce the risk of human error can invest
Envoyé Oui
Condensat 200 2022 255 about access accidental accounts accurate activity adequate adhere adherence adopt again against alert alerts algorithm algorithms all alone also amounts any appears application are aren’t around article associated at&t attack attacks attention author automated automatic automating automation average avoid back based become before behavior being best block boost boosting both breach breaches bullet businesses but called can cite cloud collected common companies compliance conclusion cons constant constantly content contextual cost costly create critical crucial cutting cyberattack cyberattacks cybersecurity data day decisions decrease delivered department’s detect detected detection detections difference distracted distraction documents does down draw due during edge effective effectiveness efficacy efficiency eliminate email emails embrace employee employees empower emptively endorse endpoint ensure ensures eradicates error even event every example existing expedite exploited extremely facing factors failing false far fast fatigue fell field files finance financial findings fine fines firewall firm firms flag flagged flawed flexibility focus folks follow following form found fraud fraudulent free from globe guard hackers handles harmful heavy hefty help helps highlights home however huge human identity ignored importance important improve incident including incorporate increasingly indicators information input instead intelligence interest interrupting interruption intervention invest isn’t keep key lead learn learning legitimate leverage lifting like likely limit logging look looking machine machines maintain make malware management may mean meaning means meanwhile million minimizes mitigating models modern monitored morale more most mttd mttr must myriad necessary need not office online only open operational operations orchestration order other otherwise outweigh own parameters particularly password patterns phishing plays pose positions positives post potential practices pre preempt procedures process produce productivity program proper pros protocols provided rapid real reason recent recognize reduce reduced reducing regularly regulations relevant remain repair reported researchers respondents response responses responsibility result review rise risk risks risky robotic robust role rpa rpas rules running said save say scale scam scans sector security servers sheer shorter should shut shutdowns shuts siem siems silver simple simply soar software solely solutions some soon sources specialists speed staff stakeholders stanford starting statistic strategy stressed suggest systems tasks team that: them then thinking those threat threats time timely to: today too tool tools trained training transactions troubling tuning university unlike unsafe update updated updates use used useful usual vary victim views vigilance vital vulnerabilities vulnerability well when where which who why wider will with: within without working workplace works world
Tags Data Breach Malware Tool Vulnerability Threat
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: