Site icon TechArena

The ‘New Normal’ is Here to Stay – Check Point Software´s Survey Reveals Organizations’ Security Priorities for 2021 and Beyond

Checkpoint

Checkpoint

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, has today released the findings of a new survey, which shows organizations’ key cyber-security priorities and challenges through to 2023, and highlights the changes to their security strategies forced by the COVID-19 pandemic during 2020. 

Over half of respondents said their organizations are seeing more attacks and threats now than at the start of 2020.  The majority believe their approach to security will not return to its pre-pandemic state, with just one in five saying that their security operations have returned to what they were.  Key findings from the survey of over 600 IT security professionals globally are:

“The survey shows that a majority of organizations do not expect their current security issues and priorities to change much over the next two years. For many, the rapid changes they made to their networks and security infrastructures in response to the pandemic will be permanent,” said Peter Alexander, Chief Marketing Officer at Check Point Software.  “At the same time, cyber-attacks and threats are increasing as hackers try to take advantage of those changes.  So organizations need to prioritize closing off any security gaps across their new distributed networks, from employees’ home PCs and employees themselves to the data center. Dealing with the impact of the pandemic on business operations, and ensuring they can continue to operate as efficiently and as securely as possible will be the biggest ongoing challenge for most enterprises.”

To block the growing volumes of cyber-attacks and threats, organizations need to prioritize closing off any security gaps across their new distributed networks, from employees’ home PCs and employees themselves to the data center.  Here are our tips to help organizations evolve their security strategies to ensure they can continue to operate as efficiently and as safely as possible:

Exit mobile version