Now you can vouch for data security of your system with Dell EMC
In recent times, there is a surge in cybersecurity budgets of enterprises. Organizations across India are increasingly feeling the significance of ensuring business continuity amidst the growing sophistication of cyber-attacks. According to a new study, in the current financial year, a whopping 92 percent of companies have increased their budget allocated exclusively for cybersecurity.
Some common preventive steps, which are being adopted by most enterprises, include the deployment of defence measures like firewalls and antivirus software and services, in addition to educating employees about various aspects of cyber security, data breaches, and their potential threats. On the other hand, some forward-looking organizations are going beyond the conventional route to simulate and analyze attacks happening in the industry, gain more insights into tactics and motivation of attackers, and explore innovative ways to prevent any anticipated attack.
If a study by Trend Micro is anything to go by, on average, it takes as many as 230 days for a company to identify a breach in its system, even when it has security software installed and running on it. On the other hand, a FireEye study puts the time between compromise and detection for a company at 146 days.
Although prevention is the first priority for every organization, many Indian enterprises have started realizing that it is not feasible for them to prevent almost every security attack. And therefore, they have started moving from the mere prevention approach to detection and response. Changing their mindsets, they are working on their ability to identify security incidents and cater to them in a more effective manner.
Of late, threat intelligence capability is now being used by organizations to predict and pre-empt attacks on their infrastructure. For instance, if a bank identifies a group of cyber criminals attacked a few banks with a specific method, then it would be an early warning for the bank and they can work to pre-empt the attacks. The growing popularity of detection as well as response approaches has also resulted in advanced capabilities like new endpoint security as well as management portfolio. These portfolios come with a full suite of best-of-breed solutions catering to data protection, threat protection as well as response, identity assurance, and endpoint management.
Recently, many organizations have taken a number of initiatives to champion the cause of data security. Dell, for example, has taken this cyber security issue to a whole new level by launching the #DataSuraksha campaign. Their efforts to spread awareness about cybercrime and data security are worth sharing. I liked how actively they are encouraging people to come forward and share their views and ideas about how to keep data protected. Not only that, they are also rewarding great entries with attractive goodies. If you want to participate or gain more insights into the campaign, visit Dell EMC India’s Facebook and Twitter.