Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 6 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Tripwire Releases State of Cyber Hygiene Report, Identifies Where Organizations Fall Behind on Basics.

by The Gurus
July 2, 2020
in Guru's Picks, Network Security
Tripwire Releases State of Cyber Hygiene Report, Identifies Where Organizations Fall Behind on Basics.
Share on FacebookShare on Twitter

More than 60 percent of organizations not leveraging established hardening benchmarks.

Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, today released its State of Cyber Hygiene report. The survey, conducted in July in partnership with Dimensional Research, included responses from 306 IT security professionals.

Tripwire examined how organizations are implementing security controls that the Center for Internet Security (CIS) refers to as “Cyber Hygiene.” The survey found that almost two-thirds of the organizations admit they do not use hardening benchmarks, like CIS or Defense Information Systems Agency (DISA) guidelines, to establish a secure baseline.

“These industry standards are one way to leverage the broader community, which is important with the resource constraints that most organizations experience,” said Tim Erlin, vice president of product management and strategy at Tripwire. “It’s surprising that so many respondents aren’t using established frameworks to provide a baseline for measuring their security posture. It’s vital to get a clear picture of where you are so that you can plan a path forward.”

Tripwire’s State of Cyber Hygiene report explores how organizations are implementing cybersecurity practices related to network visibility, vulnerability management, configuration management, administrative privileges and logging.

Other key findings in the report include:

Many organizations still struggle to maintain visibility of their environments and quickly address unauthorized potential issues. Attackers may only need minutes on a network to launch a successful attack, yet 57 percent said it takes hours, weeks, months or longer to detect new devices connecting to their organization’s network.
Forty percent of organizations are not scanning for vulnerabilities weekly or on a more frequent basis despite recommendations, and only half run the more comprehensive authenticated scans. It takes 27 percent of organizations anywhere from a month to more than one year to deploy a security patch.

Fifty-four percent are not collecting logs from all critical systems into a central location, and 97 percent believe they need to get more efficient at checking logs. About 25 percent said they were not efficient at all, while another 73 percent said they were fairly efficient but could improve.

Most organizations implement good basic protections around administrative privileges, but as low-hanging fruit, these controls should be in place at more organizations. Thirty-one percent of organizations still do not require default passwords to be changed, and 41 percent still don’t use multifactor authentication for accessing administrative accounts.

“When cyberattacks make the news, it can be tempting to think a new shiny tool is needed to protect your environment against those threats, but that’s often not the case,” said Erlin. “Many of the most impactful and widespread cybersecurity issues stem from a lack of getting the basics right. Cyber hygiene provides the foundational breadth necessary to manage risk in a changing landscape, and it should be the highest priority cybersecurity investment.”

To view the full State of Cyber Hygiene report, please visit: Click Here

[tpr-boilerplate company=’729′]

FacebookTweetLinkedIn
ShareTweet
Previous Post

Lastline Announces AI-driven Network Traffic Analysis Solution That Stops Advanced Threats From Entering or Operating Within a Network.

Next Post

‘Hidden Bee’ miner uses malvertising to lure victims

Recent News

Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023
UK Organisations lack clear path to achieve threat intelligence

UK Organisations lack clear path to achieve threat intelligence

June 6, 2023
A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information