Six in 10 businesses struggle to manage cyber risk

New Barracuda report explores why just 43% of organizations surveyed have confidence in their ability to address cyber risk, vulnerabilities, and attacks.

  • Friday, 26th April 2024 Posted 2 years ago in by Phil Alsop

Barracuda Networks has published the CIO report: Leading your business through cyber risk, which explores the top governance challenges facing companies trying to manage cyber risk and boost their cyber resilience. The report offers practical tools such as a checklist template, created with Barracuda’s own IT and security leadership, to help companies navigate their way to resilience.

Leveraging data from the international Cybernomics 101 study, the report assesses how challenges relating to security policies, management support, third-party access, and supply chains can undermine a company’s ability to withstand and respond to cyberattacks.

Among other things, the findings show that many organizations find it hard to implement company-wide security policies such as authentication measures and access controls. Half (49%) of the smaller to mid-sized companies surveyed listed this as one of their top two governance challenges. Further, just over a third (35%) of the smaller companies worry that senior management doesn’t see cyberattacks as a significant risk, while the larger companies are most likely to struggle with a lack of budget (38%) and skilled professionals (35%).

Many organizations have concerns about a lack of security and control over the supply chain and visibility into third parties with access to sensitive or confidential data. Around one in 10 doesn’t have an incident response plan to turn to in the event of a successful breach.

“For many businesses today, a security incident of some kind is almost inevitable,” said Siroui Mushegian, CIO of Barracuda Networks. "What matters is how you prepare for, withstand, respond to, and recover from the incident. This is cyber resilience. Advanced, defense-in-depth security solutions will take you most of the way there, but success also depends on security governance — the policies and programs, leadership, and more that enable you to manage risk. When NIST updated its benchmark cybersecurity framework earlier this year, it added security governance as a strategic priority.”

The report offers practical templates to help organizations manage cyber risk and map where they are in their journey toward cyber resilience. The cyber resilience checklist draws on the latest iteration of the U.S. National Institute of Standards and Technologies (NIST) Cybersecurity Framework and can be freely downloaded and printed from the Barracuda website.

AvePoint has introduced updates to its Confidence Platform, with a focus on AI data protection, multicloud resilience, and governance capabilities.
inforcer introduces Copilot Manager to support MSPs in delivering AI services, including features related to monitoring and managing Shadow AI usage.
Guardz outlines how AI is influencing cybersecurity, with the report highlighting identity-related issues and vulnerabilities affecting MSPs, based...

Kaseya launches Agentic IT management platform

Posted 6 hours ago by Sophie Milburn
Kaseya has introduced an autonomous IT management system that uses AI and unified data to support IT operations and security management.
Westcon-Comstor has integrated its value-added services into the Microsoft Marketplace, aiming to support partner operations and improve scalability.

Pax8 and NinjaOne forge alliance to enhance SMB security

Posted 9 hours ago by Sophie Milburn
Pax8 teams up with NinjaOne, aiming to strengthen managed service providers through enhanced solutions and security infrastructure for SMBs.

Governing autonomous AI: challenges and solutions

Posted 1 day ago by Sophie Milburn
Exploring identity challenges with AI agents and governance opportunities for secure and scalable AI execution.

The risks of unsupervised AI adoption in UK enterprises

Posted 1 day ago by Sophie Milburn
As UK businesses increasingly adopt AI, risky data-sharing practices arise, underscoring the need for enhanced oversight and security measures.