The cyberthreat landscape continues to evolve at a rapid pace. The COVID-19 pandemic has forced a large portion of the global workforce to work from home. This has expanded the attack surface with unsecured devices, unauthorized software, unsecured WiFi and cloud applications. Workers (including IT staff) are confused and distracted when working at home and present soft targets for cyberattacks. Although rapid identification and remediation is a high priority for cybersecurity professionals, more than 80% of them are feeling overworked. The situation may have exacerbated owing to the pandemic.
Next-generation cybersecurity solutions on the rise
Sophisticated malware is extremely difficult to detect. It can remain patiently in your systems for a long time, waiting for the right moment to strike. Modern endpoint security solutions like Endpoint Detection and Response (EDR) focus on tracking endpoint behaviors and can help deal with a shifting attack surface. The problem, however, is that deploying expensive EDR solutions is not enough unless an experienced team of analysts are working round the clock to monitor security alerts. And the reality is that 76% of cybersecurity leaders are already citing a global security skills shortage and are unable to use technologies to their full advantage. It's like buying an expensive mobile phone and using it only to make phone calls.
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.