Promo One thing you can say about cyber-attackers. They don’t keep office hours. They – or their code – will chip away at your systems, all day, every day, looking for a way in before quietly exploiting it for as long as possible.
So what about your own security operation? Are your cyber-defences effectively on autopilot evenings and weekends?
Of course, you know your team is dedicated, and if you come under attack, they’ll put in the hours to save the day. But burnout is a real thing. And if you and your team are constantly firefighting, how do you find the time to remediate the damage done, never mind ensure your intelligence, tools and skill sets are up to date, ready for the next attack? Because there will be one.
That’s assuming you spot an attack of course. Because the bad guys’ ultimate aim is to stealthily move through your systems until they hit a cache of personal data, or IP, or the data backups that you’re relying on to recover from a ransomware attack…the ransomware attack that they’ll launch, as soon as they’ve destroyed your backups.
It’s no surprise then that companies are increasingly turning to Managed Detection and Response (MDR) services to bolster their internal cyber-sec resources. Indeed, while just five per cent of organisations were using such services in 2019, around half will by 2025, according to Gartner.
The attractions are obvious. Recruiting skilled security staff is challenging, and once you do it’s a constant juggling act splitting their time between reactive response, actively hunting for threats, and ensuring skills are kept up to date.
Which means it makes s ..