GRC Viewpoint

Around 60% of Enterprises Feel they Are Without Sufficient Protection Against Malware or Ransomware

More than half of enterprises are under the opinion that they lack enough protection against ransomware or malware. Organizations also agree that existing strategies require significant changes or complete modification to accommodate the evolving threats. And with vast amounts of sensitive data being stolen in the last few years as compared to the previous ten years, immediate remedial measures should be undertaken by enterprises all over the world and across sectors regardless of their size. 

 

The technical hurdles to ensuring sufficient malware protection are numerous. For instance, considering malware, a recent survey by OPSWAT, an infrastructure protection enterprise, confirms that almost every organization finds it tough to analyze malware.

 

READ MORE: Cybersecurity Workforce Shortage Will Continue Into 2022

The report further adds that Approximately 94% of enterprises struggle with recruiting, training, and retaining malware analysis experts. Additionally, more than 90% of enterprises find it challenging effectively finalize, implement and maintain malware analysis tools. The key concerns with respect to these tools are that they are way behind accuracy, integration, and automation. The result is the inability to identify and tackle any vulnerability incident.

 

“Malware analysis is a critical capability for management teams that want to move beyond check-the-box compliance programs and toward proactive threat management and incident response programs,” explains Benny Czarny, Founder &CEO of OPSWAT.

 

READ MORE: Surveys Point Out the Need to Implement Urgent and Up-to-date Risk Management Measures

Also, there should be more investments and research toward comprehensive technologies. As an example, consider malware again. Almost everyone is aware of antimalware software. However, not all these antimalware software is capable of protecting the endpoint. Nowadays, endpoints are the most vulnerable points, as recent studies vouch that the majority of the endpoints are susceptible to hacking and contain crucial data. 

Related Articles

Latest Articles