Intelligent CISO Issue 65 | Page 42

Gaining insight from a comprehensive cyber-resilience framework with a user-centric focus becomes a crucial element of any successful programme .
Shockingly , less than 28 % of businesses enforce the use of Multi- Factor Authentication ( MFA ).
EXPERT OPINION

Gaining insight from a comprehensive cyber-resilience framework with a user-centric focus becomes a crucial element of any successful programme .

driven by profit and care little about the industry or the competence of targeted businesses . Therefore , even if you believe your organisation has nothing of value to steal , you are not exempt from their attacks .
If you are not actively working on improving visibility in your cybersecurity efforts , the second half of 2023 may become a time when your organisation shines in all the wrong ways – making headlines in articles , breach websites and having your sensitive data shared online .
Still , you might dismiss this possibility , believing that it won ’ t happen to you or that you have nothing worth stealing .
However , it is important to acknowledge a well-known adage in the cybersecurity realm : there are two kinds of businesses – those that have been compromised and those that are unaware they have been compromised . The reality is that cyberthreats pose the most significant risk to modern businesses . These attacks continue to escalate both in volume and sophistication .
Cybercriminals exploit new vulnerabilities before they can be patched , consistently outpacing the efforts of vendors . Even when patches are available , most businesses lack formal programmes to implement them into their environments .
Regrettably , the modern business landscape struggles to keep up with the challenges of running day-to-day operations , rising costs and prevailing uncertainties . Consequently , many organisations are unaware of existing vulnerabilities or the presence of malicious actors within their digital environments .
Compromised and leaked information , as well as compromised accounts , are discovered on a daily basis across all
industries and businesses of every size . No organisation is too small or too large to be affected .
The J2 CSC team constantly identify organisations that have open and accessible platforms and do zero monitoring to identify anomalies and detect compromise . This is the same as having an intruder in your home , but you do not see them because you do not bother to turn on the lights .

Shockingly , less than 28 % of businesses enforce the use of Multi- Factor Authentication ( MFA ).

42 www . intelligentciso . com