Cyber Changes Made by Organizations to Tackle Ransomware

Share post:

In order to better protect themselves against possible ransomware attacks, organizations are making several changes to their cyber defenses.

These changes include a shift to Software-as-a-Software, multi-factor authentication (82%), single sign-on (80%), identity access management (74%), privileged access management (60%), and the much discussed and even less implemented Zero Trust (47%).

The survey conducted by Pulse and Hitachi ID found that educating employees about cybersecurity also helps to stop ransomware attacks. 69% of respondents said that their organization has increased cyber education for employees in the last 12 months.

Bryan Christ, sales engineer at Hitachi ID Systems, explains: “IT environments have become more fluid, open, and, ultimately, vulnerable. As a result, more companies are relying less on conventional methods such as a VPN to keep their networks secure. Certain credentials, such as passwords to privileged accounts, are the keys to the kingdom. If a bad actor gets their hands on these credentials, a ransomware attack is almost certain to ensue.”

For more information, read the original story in Tech Republic.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 20, 2024 -Ransomware gang claims it hit a Canadian internet provider

A ransomware gang claims it hit a Canadian internet provider. Welcome to Cyber Security Today. It's Monday May 20th,...

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways