{"id":386,"date":"2013-06-14T00:00:00","date_gmt":"2013-06-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/14\/varonis-welcomes-bank-of-englands-high-levels-of-concern-on-cyberattacks\/"},"modified":"2021-12-30T11:37:11","modified_gmt":"2021-12-30T11:37:11","slug":"varonis-welcomes-bank-of-englands-high-levels-of-concern-on-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/14\/varonis-welcomes-bank-of-englands-high-levels-of-concern-on-cyberattacks\/","title":{"rendered":"Varonis welcomes Bank of England\u2019s high levels of concern on cyberattacks"},"content":{"rendered":"<p style=\"margin: 0px;\">\u201cOur observations suggest that the vast number of breaches occurring on an almost daily basis indicates that businesses \u2013 just like individuals \u2013 are still struggling to get the basics right when it comes to securing their data.\u201d \u2014 David Gibson, Varonis Vice President . \u201cIn the results of a survey we released in April of this year (http:\/\/bit.ly\/YgmFu3), we found that 91% of people trust businesses to keep their data safe \u2013 despite PWC reported data breaches for 93% of large organisations and 87% of small businesses being seen so far this year,\u201d he added.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">David Gibson, vice president with the data governance software specialist, said that Andrew Haldane of the Bank of England is right to be concerned about the issue, as it is clear that cybercriminals are now after any customer data they can extract from financial services institutions like banks, in order to monetise their frauds.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The key question, the Varonis VP went on to say, is that it is clear that consumers value the security of their data very highly \u2013 as witnessed by the fact that 97% of survey respondents said they are more willing to do business with a company that protects their data.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cOur survey results (http:\/\/www.varonis.com\/research\/#maturity) suggest that the vast number of breaches occurring on an almost daily basis indicates that businesses \u2013 just like individuals \u2013 are still struggling to get the basics right when it comes to securing their data,\u201d he said.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cFor this reason, all businesses \u2013 and not just banks \u2013 have a role to play in eradicating their bad digital habits and taking more control of their security by implementing basic security best practices \u2013 such as ensuring that staff only have access to the data they need, that all access to all data is monitored, and abuse is investigated,\u201d he added.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.securitypark.co.uk\/varonis-welcomes-bank-of-englands-high-levels-of-concern-on-cyberattacks\/\">http:\/\/www.securitypark.co.uk\/varonis-welcomes-bank-of-englands-high-levels-of-concern-on-cyberattacks\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-386","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"predecessor-version":[{"id":2873,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/386\/revisions\/2873"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}