/>
X

Breaches by the numbers: Why adapting to regional challenges is imperative

In the past 12 months, organizations were breached an average of three times.
forrester-rgblogo.png
Written by Forrester Research on

Every year, Forrester delivers the Forrester Analytics Business Technographics® Security Survey, which gives us insight into the current state, challenges, and forward-looking priorities of security decision-makers. This year, we analyzed the data to see how digital transformation hesitancy, disaster recovery preparedness, and balancing expectations with data affect the cost and effects of breaches. Our research, included in The 2021 State Of Enterprise Breaches report, revealed the following: 

What to take away from this data 

The findings in this research go far beyond what is mentioned above to dig into how geographic differences played an outsize role in how enterprises were affected by breaches. In the full report, we dive into the nuances by region and analyze why these nuances came about. Through our findings, we highlight the following key takeaways for security professionals: 

  • The future waits for no one. Procrastinating on digital transformation efforts and other IT priorities works … until an urgent forcing function changes everything. As security professionals, you need to advocate for technology updates internally to help the organization be more flexible, adaptable, and prepared for dramatic shifts, which will continue into the foreseeable future. 

  • Following metrics leads to better outcomes. With the constant drumbeat of headline-making breaches, it's not surprising that security professionals are most concerned with external attacks. It's important, however, to lead your organization with data and metrics to ensure that you aren't missing attacks from other, more prevalent vectors. Adjust your strategy according to the data, not the headlines. 

  • Adapting to regional challenges within global companies is imperative. Not all regions are built the same — geopolitical conflict, regulations, culture, staffing availability, and other world events greatly influence the rate of breaches and timely response. Your global strategy will face challenges in different regions because of this. Adapt your timelines, strategy, and metrics to address regional limitations, and set appropriate expectations. 

This post was written by Analyst Allie Mellen and it originally appeared here.

Related

Why sudo is so important in Linux and how to use it
linux-security.jpg

Why sudo is so important in Linux and how to use it

Linux
How to use the Opera VPN (and why you should)
operavpn1.jpg

How to use the Opera VPN (and why you should)

VPN
Facebook's Meta is transferring the 'most used' JavaScript test framework to OpenJS Foundation
woman looking at computer code

Facebook's Meta is transferring the 'most used' JavaScript test framework to OpenJS Foundation

Open Source