{"id":443,"date":"2021-08-22T08:55:08","date_gmt":"2021-08-22T07:55:08","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=443"},"modified":"2021-08-22T08:56:20","modified_gmt":"2021-08-22T07:56:20","slug":"companies-play-catch-up-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/companies-play-catch-up-on-cybersecurity\/","title":{"rendered":"Companies play catch-up on cybersecurity"},"content":{"rendered":"\n<p>Few organizations have made sufficient progress in protecting information assets. This century is proving to be the century of cyber insecurity. <\/p>\n\n\n\n<p>Companies\u2019 cybersecurity measures aren\u2019t keeping pace with today\u2019s business environment demands. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>10% are approching advance cybersecurity functions(Level 3) &amp; proactive approach (Level 4)<\/li><li>20% have surpassed the cybersecurity maturity foundations (Level 2)<\/li><li>70% have yet to fully advance to a mature-based approached (Level 0-1)<\/li><\/ul>\n\n\n\n<p>Most organizations have yet to reach the advance levels of cybersecurity management demanded by today&#8217;s business environment. As such the attackers have the edge\u00a0right now, and while organizations have made some progress, most have a good deal to do to become resilient against existing cyberthreats and proactive on the rapidly changing threat landscape. Organizations have no time to lose in advancing toward holistic cyberresilience.<\/p>\n\n\n\n<p>Read the survey <a href=\"https:\/\/www.mckinsey.com\/business-functions\/risk-and-resilience\/our-insights\/organizational-cyber-maturity-a-survey-of-industries\" data-type=\"URL\" data-id=\"https:\/\/www.mckinsey.com\/business-functions\/risk-and-resilience\/our-insights\/organizational-cyber-maturity-a-survey-of-industries\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">How Can ITM Help You?<\/h5>\n\n\n\n<p>iTM covers all aspects of Cyber Security including but not limited to Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations, Mobile Device Management, Cloud security best practice &amp; architecture and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. <a rel=\"noreferrer noopener\" href=\"https:\/\/www.itminister.co.uk\/contact.html\" target=\"_blank\">Contact Us <\/a>for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Few organizations have made sufficient progress in protecting information assets. This century is proving to be the century of cyber insecurity. Companies\u2019 cybersecurity measures aren\u2019t keeping pace with today\u2019s business environment demands. 10% are approching advance cybersecurity functions(Level 3) &amp; proactive approach (Level 4) 20% have surpassed the cybersecurity maturity foundations (Level 2) 70% have &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/companies-play-catch-up-on-cybersecurity\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Companies play catch-up on cybersecurity&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[16,17,23],"tags":[],"class_list":["post-443","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-cyber-risk","category-cyber-security-research"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=443"}],"version-history":[{"count":3,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/443\/revisions"}],"predecessor-version":[{"id":446,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/443\/revisions\/446"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}