Lana Xaochay, Ivanti Data Privacy Officer, shares her perspective on the occasion of Data Privacy Day:
“When the World Wide Web launched in the public domain on April 30, 1993, no one realized the sheer amount of personal information that would be stored and shared online. According to the World Economic Forum, it’s estimated that by 2025 there will be 463 exabytes of data created every day! This poses a challenge for organizations as managing data has become increasingly complex and governments around the world have tried to rein in what and how we share and store data.
Data privacy concerns have been exacerbated by the pandemic as we have seen an uptick of ransomware and cybercrimes with bad actors taking advantage of the rapid shift to remote work, the increase in online deliveries and the proliferation of QR codes. The sheer amount of data we share about ourselves online is a privacy concern and more alarming is that many workers are using the same devices for personal and business activities. For this reason, it is critical for businesses to be able to manage all devices that access their network, along with effectively prioritizing and remediating vulnerabilities that pose the most danger to their organization.
The Ransomware Spotlight Year-End report released earlier this week underscores the need for organizations to address the rapidly evolving threat landscape, with a 29% increase in the number of vulnerabilities tied to ransomware and a 25% increase in ransomware families the frequency and sophistication of cyberattacks that will only escalate.
At Ivanti we continue to innovate and lock arms with our customers to help enable and secure the Everywhere Workplace. For instance, with Ivanti Neurons for Patch Management, which came out of beta a few days ago, we automate patch management for our customers and help them identify and patch their most critical vulnerabilities proactively. This is critical as a recent study that we conducted revealed that 71% of IT and security professionals found patching to be overly complex and time-consuming. It is critical for businesses to have real-time intelligence on known exploits along with threat context for vulnerabilities so they can respond with more agility to the vulnerabilities that place their organization at the greatest risk.”