Abnormal Security has announced the results of a new ESG Survey: The Freedom to Communicate and Collaborate, revealing that more than two-thirds of IT and security leaders are concerned that attackers are leveraging communication and collaboration channels beyond email to evade security controls.
According to the results, 47% of organizations are currently using 6-10 communication and collaboration tools at once, with video conferencing ranking as the most used tool (80%), followed by email (77%) and messaging (71%).
More than a quarter (27%) consider strengthening security controls across multiple communication and collaboration channels their top priority relative to other security threat vectors, with another 54% classifying it as a top three priority.
You can read the survey details here.
Like this:
Like Loading...
Related
This entry was posted on May 2, 2023 at 9:11 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New Research: Over Two-Thirds of Leaders Concerned Attackers Exploit Beyond Email to Evade Security
Abnormal Security has announced the results of a new ESG Survey: The Freedom to Communicate and Collaborate, revealing that more than two-thirds of IT and security leaders are concerned that attackers are leveraging communication and collaboration channels beyond email to evade security controls.
According to the results, 47% of organizations are currently using 6-10 communication and collaboration tools at once, with video conferencing ranking as the most used tool (80%), followed by email (77%) and messaging (71%).
More than a quarter (27%) consider strengthening security controls across multiple communication and collaboration channels their top priority relative to other security threat vectors, with another 54% classifying it as a top three priority.
You can read the survey details here.
Share this:
Like this:
Related
This entry was posted on May 2, 2023 at 9:11 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.