{"id":521749,"date":"2024-07-23T09:00:00","date_gmt":"2024-07-23T13:00:00","guid":{"rendered":"https:\/\/www.commvault.com\/?p=521749"},"modified":"2024-07-22T17:37:34","modified_gmt":"2024-07-22T21:37:34","slug":"cyber-challenges-to-overcome","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome","title":{"rendered":"Cyber Challenges to Overcome\u202f\u00a0"},"content":{"rendered":"\n

For security and IT professionals, the risk landscape is constantly evolving, and they are particularly concerned about external threats and breaches. Organizations realize it\u2019s not a matter of if or when they will be breached, but a matter of what to do when they find out they have already been breached.\u00a0<\/p>\n\n\n\n

We partnered with GigaOm to survey 1,000 IT and security leaders globally for our inaugural Cyber Recovery Readiness Report<\/a> \u2013 and we learned a lot about the daunting set of challenges they face.<\/p>\n\n\n\n

Respondents\u2019 top security challenges include increasingly sophisticated hackers and attack types, use of artificial intelligence by cybercriminals, a broader attack surface due to cloud and SaaS, and adopting AI-based technologies across security tooling.\u202f <\/p>\n\n\n\n

Our respondents\u2019 adoption of several general security capabilities \u2013 identity and access management; intrusion protection, detection, and response; data loss prevention\/protection; and security posture management \u2013 hovers in the 75% to 80% range, with the current solution in place either satisfactory or in need of improvement. However, looked at generally, 42% of respondents are satisfied with their general cybersecurity, while 38% see a need for improvement to their cybersecurity measures.\u202f <\/p>\n\n\n\n

When it comes to cyber recovery, the top challenge named in our survey was the complexity of critical apps and data, cited by 44% of respondents, followed by cost. A significant number of organizations (42%) lack a clear understanding of who is responsible for driving cyber resilience and recovery strategies and execution.<\/p>\n\n\n\n

Fortunately for those organizations that lack clear ownership for cyber recovery strategies \u2013 and for the 38% whose cybersecurity measures need improvement \u2013 the full Cyber Recovery Readiness Report is available now. It\u2019s full of actionable insights that will leave you better prepared to withstand and recover from a breach, including the five maturity markers we found in cyber resilient organizations. Download it here<\/a>.

<\/p>\n","protected":false},"excerpt":{"rendered":"

In a rapidly evolving landscape of risks, organizations prioritize protecting data.\u202f\u202f<\/p>\n","protected":false},"author":171,"featured_media":521750,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[207,1463],"tags":[],"cmv_author":[1538],"class_list":{"0":"post-521749","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-backup-2","8":"category-data-protection","9":"cmv_author-the-collaborative","10":"entry"},"yoast_head":"\nCyber Challenges to Overcome\u202f\u00a0 | Blog<\/title>\n<meta name=\"description\" content=\"For security and IT professionals, the risk landscape is constantly evolving, and they are particularly concerned about external threats and breaches. Organizations realize it\u2019s not a matter of if or when they will be breached, but a matter of what to do when they find out they have already been breached.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Challenges to Overcome\u202f\u00a0\" \/>\n<meta property=\"og:description\" content=\"For security and IT professionals, the risk landscape is constantly evolving, and they are particularly concerned about external threats and breaches. Organizations realize it\u2019s not a matter of if or when they will be breached, but a matter of what to do when they find out they have already been breached.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-23T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-22T21:37:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Social_Cyber-Challenges_Blog_LinkedIN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"unguyen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"unguyen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Challenges to Overcome\u202f\u00a0 | Blog","description":"For security and IT professionals, the risk landscape is constantly evolving, and they are particularly concerned about external threats and breaches. Organizations realize it\u2019s not a matter of if or when they will be breached, but a matter of what to do when they find out they have already been breached.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome","og_locale":"en_US","og_type":"article","og_title":"Cyber Challenges to Overcome\u202f\u00a0","og_description":"For security and IT professionals, the risk landscape is constantly evolving, and they are particularly concerned about external threats and breaches. Organizations realize it\u2019s not a matter of if or when they will be breached, but a matter of what to do when they find out they have already been breached.","og_url":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2024-07-23T13:00:00+00:00","article_modified_time":"2024-07-22T21:37:34+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Social_Cyber-Challenges_Blog_LinkedIN.png","type":"image\/png"}],"author":"unguyen","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"unguyen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome"},"author":{"name":"unguyen","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/dba72b5a781f4b5fd095bc52380eb45c"},"headline":"Cyber Challenges to Overcome\u202f\u00a0","datePublished":"2024-07-23T13:00:00+00:00","dateModified":"2024-07-22T21:37:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome"},"wordCount":299,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Social_Cyber-Challenges_Blog_LinkedIN.png","articleSection":["Backup and Recovery","Data Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome","url":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome","name":"Cyber Challenges to Overcome\u202f\u00a0 | Blog","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Social_Cyber-Challenges_Blog_LinkedIN.png","datePublished":"2024-07-23T13:00:00+00:00","dateModified":"2024-07-22T21:37:34+00:00","description":"For security and IT professionals, the risk landscape is constantly evolving, and they are particularly concerned about external threats and breaches. Organizations realize it\u2019s not a matter of if or when they will be breached, but a matter of what to do when they find out they have already been breached.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Social_Cyber-Challenges_Blog_LinkedIN.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Social_Cyber-Challenges_Blog_LinkedIN.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/cyber-challenges-to-overcome#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Challenges to Overcome\u202f\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/dba72b5a781f4b5fd095bc52380eb45c","name":"unguyen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/564707f567262bb740287c608ef955e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564707f567262bb740287c608ef955e5?s=96&d=mm&r=g","caption":"unguyen"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Social_Cyber-Challenges_Blog_LinkedIN.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=521749"}],"version-history":[{"count":1,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521749\/revisions"}],"predecessor-version":[{"id":521751,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521749\/revisions\/521751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/521750"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=521749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=521749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=521749"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=521749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}