by Dimitris Rodoplou
With a history dating back over three decades, Coillte is today the custodian of over 440,00 hectares of Ireland’s forest lands. However, with turnover exceeding €320 million in 2019, its three thriving businesses are also an attractive target for cyber-attackers.
When existing security functionality had to be switched off due to performance issues, the firm’s Infrastructure Architect, Marc Walsh, knew it was time to find a new provider. That’s when he turned to Trend Micro Apex One.
by Camilla Currin
We’ve heard a lot about the acceleration of digital transformation over the course of the past year. McKinsey has claimed that organisations which used to consider digital strategy in “one- to three-year phases” have shifted to doing the same in just days or weeks. At Trend Micro we wanted to find out more, specifically whether these efforts were being managed in a secure manner.
What we found in our interviews with 2,500+ IT decision makers worldwide was revealing. While digital transformation has certainly increased during the pandemic, their understanding of how to mitigate risk in the cloud has not. This threatens to leave many organisations exposed to serious reputational and financial damage.
by Trend Micro Research
As 2021 nears, enterprises have to orient themselves to the main focus areas and considerations. In response to the Covid-19 pandemic, organizations have had to rethink their operational and security processes — from business functions and cloud migrations to teleworking support. These, along with constant security risks, have not only challenged organizations in 2020 but also raised concerns regarding their readiness for disruption.
Now that working from home has become commonplace, houses have since been flipped into offices for the foreseeable future. More employees are using devices (some even personal) to access confidential data on home and corporate networks, which poses a considerable risk to any organization. Without secured access and robust security tools that protect the distributed attack surface, threat actors can easily hack into networks and jump from one machine to another until they find a suitable target.
Here are some of the other predictions that we believe security professionals and decision-makers should watch out for in the coming year.
by Gurmail Singh
In the previous part of this three-part series, we explained how organisations are increasingly exposed to financial and reputational risk through unpatched vulnerabilities. The bad news is that these flaws are being found and exploited on an ever-growing scale, thanks to the work of legitimate researchers on the one hand and cybercrime groups and nation state actors on the other. Fail to manage this risk effectively and your organisation may suffer a major data breach and/or ransomware-related outage.