Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

訂閱

Spotlight on Japan: Digital Transformation Initiatives Heighten Risk Levels 

As Japanese organizations roll out digital transformation initiatives and expand remote workforces, security teams need to address new risks in the new world of work.

The rapid transition to remote work and an intense focus on meeting customer demands through digital transformation initiatives have exposed Japanese organizations to business-impacting* cyberattacks over the past 12 months. The vast majority of these targeted remote workers (72%) and third-party software vendors (72%), underscoring the need for greater visibility into the expanding attack surface, improved management of user privileges and continuous monitoring of the software supply chain.

The self-reported data is drawn from a commissioned study of more than 1,300 security leaders, business executives and remote employees worldwide, including 65 respondents in Japan. The study, Beyond Boundaries: The Future of Cybersecurity in the New World of Work, was conducted in April 2021 by Forrester Consulting on behalf of Tenable.

Remote work heightened risk

While many aspects of the pandemic response are certainly unprecedented, the remote-work experiment in Japan accelerated trends that already existed in the world of IT. With a workforce more distributed than ever and devices connecting to new home networks, the cyberattack surface expanded, opening the door to new attack vectors.

Unsurprisingly, in the past year, a staggering 93% of Japanese organizations experienced a business-impacting cyberattack, with 64% suffering an attack that resulted from vulnerabilities in systems put in place in response to the pandemic. 



Despite this elevated risk, it's looking more certain than ever before that the work-from-home model is not going away, even as organizations emerge from crisis mode and begin planning their workforce strategies. More than two thirds (67%) of Japanese organizations plan to have employees working from home at least once a week in the next 12-24 months.

Remote work priorities continue to scale

As enterprise security and business leaders turn their eyes forward and continue to plan for the new work order, it's important to ensure that all CIOs and CISOs are equipped with the necessary tools and resources needed to enable large-scale remote work. Over the next two years, Japanese organizations will continue to focus on enhancing existing digital platforms (78%), moving non-business-critical functions to the cloud (63%) and expanding software supply chains (55%).

But, security doesn't appear to be as dynamic as the workplace itself, highlighting an incongruence between future priorities and the reality of securing those plans. An alarming 44% of security and business leaders believe their organizations are only somewhat or not prepared at all to secure their remote workforce.

To prevent history from repeating itself, it's clear that organizations need to eliminate blindspots by shoring up their defenses to support the next phase of their workforce model.



Securing the new reality


Remote work isn't a novelty but a norm and organizations need to ensure that their people, processes and technology are able to function securely with minimal interruption. Therefore, security teams need to revisit their security policies and redesign their digital infrastructure to accommodate the remote workforce of tomorrow.

Organizations cannot rely on yesterday's tools to secure this new reality. This starts with adopting a never trust, always verify approach throughout the organization. It calls for viewing trust as a vulnerability and posits that any notion of trust be removed from digital systems entirely. Organizations also need a modern, comprehensive strategy to quickly and accurately identify vulnerabilities and misconfigurations in their dynamic infrastructures, one which delivers clear guidance and recommendations on how to prioritize and remediate any risks.

If cybersecurity strategy fails to keep pace with business changes, today's risk could become tomorrow's reality.

*A business-impacting cyberattack is one which results in one or more of the following outcomes: loss of customer, employee, or other confidential data; interruption of day-to-day operations; ransomware payout; financial loss or theft; and/or theft of intellectual property.

View more study highlights here

相關文章

您是否容易受到最新攻擊程式危害?

輸入您的電子郵件地址,以便收到最新 cyber exposure 警示。

tenable.io

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable.io Vulnerability Management 試用版也包含 Tenable Lumin、Tenable.io Web Application Scanning 和 Tenable.cs Cloud Security。

tenable.io 購買

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

65 項資產

選取您的訂閱選項:

立即購買

免費試用 Nessus Professional

免費試用 7 天

Nessus® 是現今市場上功能最全面的弱點掃描工具。Nessus Professional 能協助自動化弱點掃描程序、節省您達到合規性的時間並讓您的 IT 團隊合作。

購買 Nessus Professional

Nessus® 是現今市場上功能最全面的弱點掃描工具。Nessus Professional 能協助自動化弱點掃描程序、節省您達到合規性的時間並讓您的 IT 團隊合作。

購買多年期授權,節省更多。新增 365 天全年無休 24 小時全天候可使用電話、社群及對談的進階支援。

選擇您的授權

購買多年期授權,節省更多。

增加支援與訓練

Tenable.io

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。

您的 Tenable.io Vulnerability Management 試用版也包含 Tenable Lumin、Tenable.io Web Application Scanning 和 Tenable.cs Cloud Security。

Tenable.io 購買

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

65 項資產

選取您的訂閱選項:

立即購買

試用 Tenable.io Web Application Scanning

享受我們專為現代應用程式而設計,屬於 Tenable.io 平台一部分的最新 Web 應用程式掃描產品的所有功能。不需耗費大量人力或中斷重要 Web 應用程式,即可高度準確且安全地掃描您整個線上產品系列中是否含有任何弱點。 立即註冊。

您的 Tenable Web Application Scanning 試用版也包含 Tenable.io Vulnerability Management、Tenable Lumin 和 Tenable.cs Cloud Security。

購買 Tenable.io Web Application Scanning

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

5 個 FQDN

$3,578

立即購買

試用 Tenable.io Container Security

享受整合至弱點管理平台中的唯一容器安全產品的完整功能。監控容器映像中是否有弱點、惡意軟體及政策違規的情形。與持續整合和持續部署 (CI/CD) 系統整合,以支援 DevOps 作法、加強安全性並支援企業政策合規性。

購買 Tenable.io Container Security

Tenable.io Container Security 整合了建置程序,能提供包含弱點、惡意軟體和政策違規等容器映像安全性的能見度,讓您無縫並安全地啟用 DevOps 流程。

試用 Tenable Lumin

透過 Tenable Lumin,能夠以視覺方式呈現 Cyber Exposure 並加以探索,長期追蹤風險降低狀況,以及對照同業進行指標分析。

您的 Tenable Lumin 試用版也包含 Tenable.io Vulnerability Management、Tenable.io Web Application Scanning 和 Tenable.cs Cloud Security。

購買 Tenable Lumin

聯絡業務代表,瞭解 Lumin 如何協助您獲得整個企業的深入洞見,並管理網路風險。

試用 Tenable.cs

享受完全存取偵測與修復雲端基礎架構錯誤設定及檢視執行階段弱點的功能。立即登入取得您的免費試用軟體。

您的 Tenable.cs Cloud Security 試用版也包含 Tenable.io Vulnerability Management、Tenable Lumin 和 Tenable.io Web Application Scanning。

聯絡業務代表購買 Tenable.cs

聯絡業務代表,以深入瞭解 Tenable.cs Cloud Security 如何輕鬆讓您的雲端帳戶上線,以及如何在數分鐘內輕鬆取得雲端錯誤設定與弱點的能見度。

免費試用 Nessus Expert

免費試用 7 天

Nessus Expert 是專為現代攻擊破綻所打造,它能讓您從 IT 到雲端洞察更多資訊,並保護貴公司免於弱點危害。

您已擁有 Nessus Professional 嗎?
升級至 Nessus Expert,免費試用 7 天。

購買 Nessus Expert

Nessus Expert 是專為現代攻擊破綻所打造,它能讓您從 IT 到雲端洞察更多資訊,並保護貴公司免於弱點危害。

選擇您的授權

促銷價格將延長至 12 月 31 日止。
購買多年期授權省更多!

增加支援與訓練