{"id":4926,"date":"2022-10-28T15:37:05","date_gmt":"2022-10-28T11:37:05","guid":{"rendered":"https:\/\/divcor.dreamhosters.com\/?p=4926"},"modified":"2023-01-16T10:43:36","modified_gmt":"2023-01-16T06:43:36","slug":"sophos-cybersecurity-the-human-challenge","status":"publish","type":"post","link":"https:\/\/testenv.dreamhosters.com\/ru\/sophos-cybersecurity-the-human-challenge\/","title":{"rendered":"Sophos. Cybersecurity: The Human Challenge"},"content":{"rendered":"<p style=\"box-sizing: inherit; margin-top: 0px; margin-bottom: 1em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\"><span style=\"color: #000000;\">Based on a comprehensive survey of 5,000 IT managers across 26 countries,\u00a0<a style=\"box-sizing: inherit; color: #000000;\" href=\"https:\/\/www.sophos.com\/en-us\/content\/cybersecurity-the-human-challenge.aspx\">Cybersecurity: The Human Challenge<\/a>\u00a0provides brand new insights into the st<span style=\"box-sizing: inherit; font-size: 1em;\">ate of cybersecurity skills and resources across the globe.<\/span><\/span><\/p>\n<p style=\"box-sizing: inherit; margin-top: 0px; margin-bottom: 1em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\"><span style=\"color: #000000;\">It reveals\u00a0the realities facing IT teams when it comes to the human-led delivery of cybersecurity, and explores how organizations are responding to the skills challenges they face.<\/span><\/p>\n<p style=\"box-sizing: inherit; margin-top: 0px; margin-bottom: 1em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\"><span style=\"color: #000000;\">The study also exposes unique insights into the relationship between an organization falling victim to ransomware and their day-to-day cybersecurity practices.<\/span><\/p>\n<h2 style=\"box-sizing: inherit; font-size: 1.77689em; font-weight: 300; margin-top: 1em; margin-bottom: 0.75019em; clear: both; line-height: 1.333em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; background-color: #f8f8f8;\"><span style=\"color: #000000;\">Key findings<\/span><\/h2>\n<h3 style=\"box-sizing: inherit; font-size: 1.333em; font-weight: 400; margin-top: 1em; margin-bottom: 1em; clear: both; line-height: 1em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; background-color: #f8f8f8;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif; color: #000000;\">IT teams are showing progress in many battles<\/span><\/h3>\n<ul style=\"box-sizing: inherit; padding-left: 0px; margin: 0px 0px 1em 1.333em; list-style-position: initial; list-style-image: initial; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\">\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">IT teams are on top of patching<\/span>. Three-quarters of IT teams apply patches to desktops, servers, applications, and internet-facing assets within a week of release. Servers and internet-facing assets are patched most quickly, with 39% of respondents patching them within 24 hours.<\/span><\/li>\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Prevention is prioritized.\u00a0<\/span>On average, IT teams dedicate nearly half their time (45%) to prevention. After that, 30% of time is spent on detection and the remaining 25% is spent on response.<\/span><\/li>\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">IT managers are keeping up to date with cybersecurity.<\/span>\u00a0The majority (72%) say that they and their teams are up to date with or ahead of cybersecurity threats. Just 11% think they are significantly behind.<\/span><\/li>\n<\/ul>\n<h3 style=\"box-sizing: inherit; font-size: 1.333em; font-weight: 400; margin-top: 1em; margin-bottom: 1em; clear: both; line-height: 1em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; background-color: #f8f8f8;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif; color: #000000;\">Improving cybersecurity requires people \u2013 who are in short supply<\/span><\/h3>\n<ul style=\"box-sizing: inherit; padding-left: 0px; margin: 0px 0px 1em 1.333em; list-style-position: initial; list-style-image: initial; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\">\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">There is an urgent need for human-led threat hunting<\/span>. Forty-eight percent of respondents have already incorporated human-led threat hunts in their security procedures and a further 48% plan to implement them within a year.<\/span><\/li>\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">The cybersecurity skills shortage is directly implementing protection.<\/span>\u00a0Over a quarter (27%) of managers said their ability to find and retain skilled IT security professionals is the single biggest challenge to their ability to deliver IT security, while 54% say it is a major challenge.<\/span><\/li>\n<\/ul>\n<h3 style=\"box-sizing: inherit; font-size: 1.333em; font-weight: 400; margin-top: 1em; margin-bottom: 1em; clear: both; line-height: 1em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; background-color: #f8f8f8;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif; color: #000000;\">Organizations are changing the ways they deliver security<\/span><\/h3>\n<ul style=\"box-sizing: inherit; padding-left: 0px; margin: 0px 0px 1em 1.333em; list-style-position: initial; list-style-image: initial; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\">\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Improving operational efficiency is a key priority<\/span>. Four in ten (39%) respondents said that improving operational efficiency and scalability is one of their biggest priorities for the IT team this year.<\/span><\/li>\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Outsourcing IT security is rising fast<\/span>. Currently, 65% outsource some or all of their IT security efforts. This is set to rise to 72% by 2022. The percentage of organizations that exclusively uses in-house staffing will drop from 34% to 26%.<\/span><\/li>\n<\/ul>\n<h3 style=\"box-sizing: inherit; font-size: 1.333em; font-weight: 400; margin-top: 1em; margin-bottom: 1em; clear: both; line-height: 1em; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; background-color: #f8f8f8;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif; color: #000000;\">Ransomware victims display different behaviors and attitudes than those who haven\u2019t been hit<\/span><\/h3>\n<ul style=\"box-sizing: inherit; padding-left: 0px; margin: 0px 0px 1em 1.333em; list-style-position: initial; list-style-image: initial; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\">\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1em;\">Ransomware victims are more exposed to infection from third parties.\u00a0<\/span><span style=\"box-sizing: inherit; font-size: 1em;\">Twenty-nine percent of organizations hit by ransomware in the last year allow five or more suppliers to connect directly to their network \u2013 compared to just 13% for those that weren\u2019t hit.<\/span><\/span><\/li>\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Ransomware damages professional confidence.\u00a0<\/span>IT managers whose organizations were hit by ransomware are nearly three times as likely to feel \u201csignificantly behind\u201d on cyberthreats than those that weren\u2019t (17% vs. 6%).<\/span><\/li>\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Being hit accelerates implementation of human-led threat hunting.\u00a0<\/span>Forty-three percent of ransomware victims plan to implement human-led hunting within six months, compared to 33% for those that didn\u2019t suffer an attack.<\/span><\/li>\n<\/ul>\n<ul style=\"box-sizing: inherit; padding-left: 0px; margin: 0px 0px 1em 1.333em; list-style-position: initial; list-style-image: initial; color: #00193b; font-family: SophosSansRegular, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; background-color: #f8f8f8;\">\n<li style=\"box-sizing: inherit;\"><span style=\"color: #000000;\"><span style=\"box-sizing: inherit; font-family: SophosSansSemibold, 'Helvetica Neue', Helvetica, Arial, sans-serif;\">Victims have learned the importance of skilled security professionals.\u00a0<\/span>More than one-third (35%) of ransomware victims said recruiting and retaining skilled IT security professionals is their\u00a0<em style=\"box-sizing: inherit;\">single biggest challenge\u00a0<\/em>when it comes to cybersecurity, compared to just 19% who hadn\u2019t been hit.<\/span><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Based on a comprehensive survey of 5,000 IT managers across 26 countries,\u00a0Cybersecurity: The Human Challenge\u00a0provides brand new insights into the state of cybersecurity skills and resources across the globe. It reveals\u00a0the realities facing IT teams when it comes to the human-led delivery of cybersecurity, and explores how organizations are responding to the skills challenges they [&hellip;]<\/p>","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[36,73,87],"tags":[],"class_list":["post-4926","post","type-post","status-publish","format-standard","hentry","category-business","category-marketing","category-partners"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/posts\/4926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/comments?post=4926"}],"version-history":[{"count":1,"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/posts\/4926\/revisions"}],"predecessor-version":[{"id":4927,"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/posts\/4926\/revisions\/4927"}],"wp:attachment":[{"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/media?parent=4926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/categories?post=4926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testenv.dreamhosters.com\/ru\/wp-json\/wp\/v2\/tags?post=4926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}