{"id":231,"date":"2013-04-11T00:00:00","date_gmt":"2013-04-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/11\/detection-response-key-to-effective-security\/"},"modified":"2021-12-30T11:36:47","modified_gmt":"2021-12-30T11:36:47","slug":"detection-response-key-to-effective-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/11\/detection-response-key-to-effective-security\/","title":{"rendered":"Detection, response key to effective security"},"content":{"rendered":"<p>While security is generally top of the IT department\u2019s agenda, and it is the IT department\u2019s role to secure a business\u2019 systems and data, many security weaknesses are unwittingly caused by these same people who are responsible for securing a network. This was the result of research conducted by security software company Kaspersky Lab, says Danny Myburgh, MD of Cyanre, and is the result of the IT department\u2019s focus on keeping IT working, and because they are caught between the business needs of securing devices and data and the increasing demands for mobility.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">With corporate security measures becoming increasingly more effective, often the only point of entry to a company\u2019s network for a cyber criminal is via an employee.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cResearch found that the negative impact of mobile devices on security was not only the result of the mobility of devices, but because of a number of assumptions IT departments make around the data they carry. In today\u2019s mobile business environment, securing mobile devices has become a priority, but many IT departments neglect to think about the fact that the data carried on these devices isn\u2019t contained as it would be in a centralised office environment. By working with the assumption that this is the same situation as when the data is in the data centre, IT becomes an unwitting accomplice of cyber criminals, according to Kaspersky\u2019s research,\u201d Myburgh points out.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cIDC data also shows that mobility is the number one factor driving new security spending, suggesting that more organisations are taking heed and beefing up security measures beyond their data centre perimeters.\u201d<\/p>\n<p>\nLink: <a href=\"http:\/\/www.itweb.co.za\/index.php?option=com_content&amp;view=article&amp;id=63127\">http:\/\/www.itweb.co.za\/index.php?option=com_content&amp;view=article&amp;id=63127<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-231","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/231\/revisions"}],"predecessor-version":[{"id":2718,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/231\/revisions\/2718"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}