Year after year, there are more and more threats in the world and there are more and more data leaks. The statistics are shocking: according to the RiskBased Security report, 7.9 billion cases of data leakage were recorded in the first nine months of 2019 alone. These figures exceed the figures for the same period in 2018 by more than twice (by 112%).
Most often, medical and government institutions or organizations from the retail sector are exposed to data leakage.
In most cases, the reason is the actions of criminals. Some organizations attract intruders for an understandable reason – financial and medical data can be stolen from them. However, any company can become a target, because criminals can hunt for customer data, spy or prepare an attack on one of the customers.
International Data Corporation predicts that if the number of cyber threats continues to grow, the amount of spending on cybersecurity solutions will reach US$ 133.7 billion by 2022. Governments of different countries are fighting criminals, helping organizations to implement effective cybersecurity methods.
Thus, the US National Institute of Standards and Technology (NIST) has developed the principles of secure IT infrastructure. NIST recommends constant monitoring of all electronic resources in real time in order to identify malicious code before it causes harm and prevent its spread.
The National Cyber Security Centre of the UK government has released a guide 10 steps to cyber security (10 steps to cybersecurity). It talks about how important it is to monitor the operation of systems. In Australia, recommendations on combating the latest cyber threats are regularly published by the Australian Cyber Security Centre (ACSC).