Site icon Digital Creed

1 in 3 Employees Don’t Use Company VPNs at Home: CISO MAG Survey

Power List, CISO MAG Network Security

With increased digitalization and cloud migration, the corporate network now extends further out into the Internet — beyond the boundaries and firewalls of an organization. Even the concept of WAN and branch offices is extended. Partners, customers, suppliers, and employees connect to the corporate network from remote locations around the globe. In that sense, it is a borderless network of interconnected networks. That ups the risk for data security, network security, and endpoint security. The threat landscape has broadened to include threats to both, wired and wireless networks. Therefore, when one thinks about network security, it is not just about the security of the internal network, but also that of the extended network.

With more and more software as a service models emerging, demand for security has increased at endpoints and even cloud systems.

To validate its research on the usage of network security solutions, CISO MAG conducted a multiple-choice survey, in the month of February 2020. There were 280 respondents for this survey that included CISOs, COO, CSO, compliance managers, CIOs, CEOs, data protection managers, Director of IT and others.

Here are some key findings of the survey, suggesting the trends in the network security market.

Key Findings:

 

 

COVID-19 Snap Poll

With the COVID-19 pandemic, or­ganizations across the world are re­stricting their employees to work from home as part of social distancing to de­crease the outbreak. On the flip side, most indus­try experts state that remote work increases the risks of cyber threats like never before.

To gauge a deeper insight on the precautions companies are taking to combat the threats looming on the cyberspace, CISO MAG also did a snap poll after the survey.

Network security at home

 

 

Snap Poll key findings:

Methodology

This survey is based on the results of an online survey that was conducted by CISO MAG readers from EC-Council’s database. The respondents represent a cross-section of organizations from over 56 countries ranging from Argentina, Australia, U.S., U.K., Russia, India, France, Germany, Greece, Indonesia, Italy, Jordan, Kenya, Kuwait, Lebanon, Lithuania and even smaller countries and islands like Malawi, Mali, Nauru. Puerto Rico, Rwanda, Togo, Trinidad and Tobago, among several others. The survey was prepared in consultation with security experts and industry analysts.

Find the full survey report at: bit.ly/cisomagfree

About CISO MAG

CISO MAG is a publication from EC-Council which provides unbiased and useful information to the professionals working to secure critical sectors. The information security magazine includes news, comprehensive analysis, cutting-edge features, and contributions from thought leaders, that are nothing like the ordinary. Within the first year of launch, the magazine reached a global readership of over 50,000 readers. The magazine also has an Editorial Advisory Board that comprises some of the foremost innovators and thought leaders in the cybersecurity space. Apart from this, CISO MAG also presents a platform that reach out to the cybersecurity professionals across the globe through its Summits and Awards and Power List surveys.

About EC-Council

EC-Council, officially incorporated as the International Council of E-Commerce Consultants was formed to create information security training and certification programs to help the very community our connected economy would rely on to save them from a devastating Cyber Attack. EC-Council rapidly gained the support of top researchers and subject matter experts around the world and launched its first Information Security Program, the Certified Ethical Hacker. With this ever-growing team of subject matter experts and InfoSec researchers, EC-Council continued to build various standards, certifications and training programs in the electronic commerce and information security space, becoming the largest cybersecurity certification body in the world.

RELATED STORY

Secure Your Mobile Devices and Wireless Connections When Working From Home

Exit mobile version