Intelligent CISO Issue 25 | Page 27

HOW CAN BUSINESSES BOLSTER THEIR CYBER DEFENCES IN LIGHT OF INCREASED ATTACKS DURING THE CORONAVIRUS CRISIS? early three N quarters of business decision makers (71%) believe that the shift to 100% remote working during the COVID-19 crisis has increased the likelihood of a cyber breach, according to new data released by cybersecurity company, Centrify, a leading provider of identity-centric privileged access management solutions. The data, obtained via a poll of 200 senior business decision makers in large and medium-sized UK companies conducted by independent polling company, Censuswide, on behalf of Centrify, also revealed that 46% have already noted an increase in phishing attacks since implementing a policy of widespread remote working. The polling took place on March 26–27, as the UK government announced much stricter lockdown policies to tackle the Coronavirus (COVID-19), including urging all employees to work from home where possible. ? The research also found that 79% of business decision makers have increased their cybersecurity procedures to manage high volumes of remote access over the next three months. Similarly, 73% of businesses have given staff extra training on how to remain cybersafe when working remotely, with specific training around verifying passwords and log-in credentials. The survey also noted additional fears that IT systems are at risk, with over half (53%) saying they believe that privileged IT admin remote access is at risk of security breach. editor’s question Andy Heather, VP, Centrify, said: “Cybercriminals will no doubt attempt to seize the opportunity presented by the allout expansion of remote workers, many of whom have not been proficiently trained in even the most basic of cybersecurity measures. Therefore, it is essential that businesses and employees remain vigilant during these challenging times.” 79% of business decision makers have increased their cybersecurity procedures to manage high volumes of remote access over the next three months. www.intelligentciso.com | Issue 25 27