Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies, also known as functionality cookies, enhance a website's performance and functionality. While they are not strictly necessary for the website to function, they provide additional features that improve the user experience.

 

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Always Active

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Targeting cookies, are used to deliver advertisements that are more relevant to the user's interests. These cookies track a user’s browsing habits and behavior across websites, enabling advertisers to create targeted ad campaigns and measure their effectiveness

the key and the keyboard highlights the importance of cybersecurity and protecting sensitive data.

Complex IT Systems Hinder Cyber Resilience, Study Finds

Winncom-170
A recent study highlights that 43% of IT and security leaders view complex IT systems as the greatest obstacle to effective cyber resilience, exceeding the challenges posed by outdated legacy systems.

New research reveals that the complexity of IT and security infrastructures is the primary barrier to achieving robust cyber resilience.

Cyber resilience, which is becoming increasingly important as cyber-attacks become more complicated and widespread, is an organization’s ability to prepare for, react to, and recover from cyberattacks. It goes beyond just having backups. It includes preventative measures and ensuring the continuity of critical business operations during and after an incident. Cyber resilience is essential to the continued operation of critical infrastructures and other companies in essential industries.

Key Findings from the Zscaler Report

In December 2024, Zscaler conducted a survey titled “Unlock the Resilience Factor: Why Resilient by Design is the Next Cyber Security Imperative,” involving 1,700 IT leaders across 12 global markets. The study revealed that 43% of respondents consider the complexity of IT and security infrastructure as the most significant barrier to cyber resilience. This complexity often arises from integrating various technologies, managing multiple security solutions, and navigating intricate network architectures.

Additionally, 60% of IT leaders anticipate a significant cyber incident within the next year, and 45% have experienced such an event in the past six months. These statistics underscore the urgency for organizations to streamline their IT environments and adopt proactive security measures.

Challenges Posed by Legacy Systems

Legacy systems—outdated hardware and software still in use—pose another substantial challenge. These systems often lack modern security features, making them vulnerable to attacks. Updating or replacing legacy systems can be costly and complex, leading organizations to delay necessary upgrades. However, maintaining these outdated systems can increase the risk of security breaches and operational disruptions.

The Role of Zero Trust Architecture

To address these challenges, experts advocate for adopting a Zero-Trust architecture. This security model operates on the principle of “never trust, always verify,” requiring continuous authentication and authorization for all users and devices accessing network resources. Implementing Zero-Trust can help minimize attack surfaces, prevent unauthorized access, and enhance overall cyber resilience.

Recommendations for Enhancing Cyber Resilience

Organizations aiming to improve their cyber resilience should consider the following strategies:

  1. Simplify IT Infrastructure: Reducing complexity by consolidating systems and applications can simplify management and decrease potential vulnerabilities.
  2. Upgrade Legacy Systems: Investing in modern technologies with built-in security features can protect against threats and improve operational efficiency.
  3. Implement Zero Trust Principles: Adopting a Zero Trust security model ensures that all access requests are continuously verified, reducing the risk of unauthorized access.
  4. Continuous Monitoring and Assessment: Regularly evaluating security measures and conducting vulnerability assessments can help promptly identify and address potential weaknesses.
  5. Employee Training and Awareness: Educating staff about cybersecurity best practices fosters a security-conscious culture and reduces the likelihood of human error leading to security incidents.

As cyber threats evolve and become more sophisticated, organizations face the challenge of adapting their IT and security infrastructures to remain protected. This involves proactively addressing the complexities that arise from outdated technologies, the implementation of legacy systems, and new threats that have not yet been discovered. Businesses should proactively implement cybersecurity best practices to enhance cyber resilience and protect themselves against future attacks. This includes updating systems to utilize modern best practices, simplifying legacy systems to improve security, and implementing robust security models like Zero Trust.

Ad_TwoHops_1040

AGL Staff Writer

AGL’s dedicated Staff Writers are experts in the digital ecosystem, focusing on developments across broadband, infrastructure, federal programs, technology, AI, and machine learning. They provide in-depth analysis and timely coverage on topics impacting connectivity and innovation, especially in underserved areas. With a commitment to factual reporting and clarity, AGL Staff Writers offer readers valuable insights on industry trends, policy changes, and technological advancements that shape the future of telecommunications and digital equity. Their work is essential for professionals seeking to understand the evolving landscape of broadband and technology in the U.S. and beyond.

More Stories

Enable Notifications OK No thanks