SlideShare a Scribd company logo
1 of 15
Download to read offline
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
CYBER-SECURITY
DEFENDING YOUR COMPANY AGAINST CYBER-ATTACKS
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
CURRENT CYBER-SECURITY 
CHALLENGES COMPANIES FACE
64%
of Australian CIOs say the number of
detected security threats has increased
compared with 12 months ago
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
TOP 3 IT SECURITY RISKS FACING ORGANISATIONS
CURRENT CYBER-SECURITY 
CHALLENGES COMPANIES FACE
SPYING/SPYWARE/RANSOMWARE
(economic espionage)
CYBER-CRIME
(fraud, extortion and data theft)
46%49% 49%
DATA ABUSE/DATA INTEGRITY
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
WHAT ABOUT
INTERNAL IT SECURITY RISKS
77%
of companies allow their
employees to access corporate
data on their personal devices
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
TOP 3 ACTIONS TO PROTECT CORPORATE DATA ON
EMPLOYEES’ PERSONAL DEVICES FROM CYBER-ATTACKS
WHAT ABOUT
INTERNAL IT SECURITY RISKS
Provide training to
employees on maintaining
security on personal devices
Request employees sign an
acceptable usage policy for keeping
company information secure
Deploy mobile device
management technology to
enforce enhanced protection
56% 55% 49%
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
THE KEY CHARACTERISTICS
OF AN EFFICIENT IT SECURITY STRATEGY
Has effective governance in place
with an overarching view
Takes a risk-based approach to cover
the enterprise’s operations and supply
chain, including third-party vendors
Has the support of senior management
Creates employee awareness
1
2
3
4
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
WHAT ARE AUSTRALIAN
COMPANIES DOING
The response for many companies is to rethink their IT
security practices and to implement an integrated approach
to preventing, detecting and mitigating cyber-attacks.
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
TOP 5 MEASURES COMPANIES ARE TAKING TO ENHANCE IT SECURITY
WHAT ARE AUSTRALIAN
COMPANIES DOING
69%
47%
39%
38%
29%
Enhancing/implementing mobile device security
Managing Advanced Persistent Threats (APTs)
Contracting with third-party vendors or
adding tools to enhance security
Enhancing cloud security
Implementing multi-factor authentication
processes (e.g. tokens, biometrics)
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
WHY CYBER-SECURITY SHOULD
BE A PRIORITY FOR SMEs
For SMEs, the rise of mobile
technology, cloud technology and
other interactive tools have created
more business opportunities.
At the same time, cyber-attackers
have gained access to some large
companies through their supply chain
that lacked effective protection.
HOWEVER!
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
BUSINESSES ARE RELYING ON A MIXED WORKFORCE
COMPANIES NEED TO STAFF UP
PERMANENT SPECIALISTS RISK CONSULTANCIESCONTRACT SPECIALISTS
While having in-house IT security experts is preferable, businesses are changing their hiring strategies to
include a mixed workforce of permanent and contract specialists, including external risk consultancies.
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
COMPANIES NEED TO STAFF UP
75%
of Australian CIOs say they will face
more security threats in the next five years
due to a shortage of IT security talent
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
MOST IN DEMAND AND MOST CHALLENGING TO FIND
TOP 3 TECHNICAL SKILLS
IN IT SECURITY
CLOUD SECURITY BIG DATA/DATA ANALYTICS
1 2 3HACKING/PENETRATION
TESTING
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
DON’T FORGET ABOUT THE SOFT SKILLS!
CYBER-SECURITY SKILLS,
A HOT COMMODITY
ANALYTICAL SKILLS COMMUNICATION SKILLSBUSINESS ACUMEN
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
IT SECURITY CHECKLIST
Companies need to keep in mind 6 core steps when developing
and implementing an effective security program.
Develop policies and processes that
will help your company prevent and
defend itself against cyber-attacks.
1. BE PROACTIVE
Use the available data to identify which
risks are emerging and receding and
in which areas you need to implement
additional cyber-defences.
2. USE BIG DATA
Create a talent pipeline by investing
in your IT professionals through
extensive training, or by hiring
additional team members or an
external consultancy.
4. HAVE THE NECESSARY SKILLS
Encourage regular training of all
personnel on cyber-security policies
and corporate practices.
6. SUPPORT TRAINING
Make everyone in the company
aware of the risks associated
with email, social media and
confidential information.
5. GET EVERYONE INVOLVED
3. TREAT IT SECURITY AS A CONTINUOUS
ENTERPRISE-WIDE PROCESS
Consistently test and re-evaluate
existing processes and systems
that are designed to minimise the
inherent risks.
CYBER-SECURITY
Defending your future
roberthalf.com.au
© 2016 Robert Half International Inc. RH-1016
DOWNLOAD YOUR COMPLIMENTARY
COPY OF OUR REPORT:

More Related Content

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Cyber-security - Defending your company against cyber attacks

  • 1. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 CYBER-SECURITY DEFENDING YOUR COMPANY AGAINST CYBER-ATTACKS
  • 2. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 CURRENT CYBER-SECURITY CHALLENGES COMPANIES FACE 64% of Australian CIOs say the number of detected security threats has increased compared with 12 months ago
  • 3. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 TOP 3 IT SECURITY RISKS FACING ORGANISATIONS CURRENT CYBER-SECURITY CHALLENGES COMPANIES FACE SPYING/SPYWARE/RANSOMWARE (economic espionage) CYBER-CRIME (fraud, extortion and data theft) 46%49% 49% DATA ABUSE/DATA INTEGRITY
  • 4. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 WHAT ABOUT INTERNAL IT SECURITY RISKS 77% of companies allow their employees to access corporate data on their personal devices
  • 5. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 TOP 3 ACTIONS TO PROTECT CORPORATE DATA ON EMPLOYEES’ PERSONAL DEVICES FROM CYBER-ATTACKS WHAT ABOUT INTERNAL IT SECURITY RISKS Provide training to employees on maintaining security on personal devices Request employees sign an acceptable usage policy for keeping company information secure Deploy mobile device management technology to enforce enhanced protection 56% 55% 49%
  • 6. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 THE KEY CHARACTERISTICS OF AN EFFICIENT IT SECURITY STRATEGY Has effective governance in place with an overarching view Takes a risk-based approach to cover the enterprise’s operations and supply chain, including third-party vendors Has the support of senior management Creates employee awareness 1 2 3 4
  • 7. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 WHAT ARE AUSTRALIAN COMPANIES DOING The response for many companies is to rethink their IT security practices and to implement an integrated approach to preventing, detecting and mitigating cyber-attacks.
  • 8. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 TOP 5 MEASURES COMPANIES ARE TAKING TO ENHANCE IT SECURITY WHAT ARE AUSTRALIAN COMPANIES DOING 69% 47% 39% 38% 29% Enhancing/implementing mobile device security Managing Advanced Persistent Threats (APTs) Contracting with third-party vendors or adding tools to enhance security Enhancing cloud security Implementing multi-factor authentication processes (e.g. tokens, biometrics)
  • 9. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 WHY CYBER-SECURITY SHOULD BE A PRIORITY FOR SMEs For SMEs, the rise of mobile technology, cloud technology and other interactive tools have created more business opportunities. At the same time, cyber-attackers have gained access to some large companies through their supply chain that lacked effective protection. HOWEVER!
  • 10. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 BUSINESSES ARE RELYING ON A MIXED WORKFORCE COMPANIES NEED TO STAFF UP PERMANENT SPECIALISTS RISK CONSULTANCIESCONTRACT SPECIALISTS While having in-house IT security experts is preferable, businesses are changing their hiring strategies to include a mixed workforce of permanent and contract specialists, including external risk consultancies.
  • 11. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 COMPANIES NEED TO STAFF UP 75% of Australian CIOs say they will face more security threats in the next five years due to a shortage of IT security talent
  • 12. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 MOST IN DEMAND AND MOST CHALLENGING TO FIND TOP 3 TECHNICAL SKILLS IN IT SECURITY CLOUD SECURITY BIG DATA/DATA ANALYTICS 1 2 3HACKING/PENETRATION TESTING
  • 13. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 DON’T FORGET ABOUT THE SOFT SKILLS! CYBER-SECURITY SKILLS, A HOT COMMODITY ANALYTICAL SKILLS COMMUNICATION SKILLSBUSINESS ACUMEN
  • 14. roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 IT SECURITY CHECKLIST Companies need to keep in mind 6 core steps when developing and implementing an effective security program. Develop policies and processes that will help your company prevent and defend itself against cyber-attacks. 1. BE PROACTIVE Use the available data to identify which risks are emerging and receding and in which areas you need to implement additional cyber-defences. 2. USE BIG DATA Create a talent pipeline by investing in your IT professionals through extensive training, or by hiring additional team members or an external consultancy. 4. HAVE THE NECESSARY SKILLS Encourage regular training of all personnel on cyber-security policies and corporate practices. 6. SUPPORT TRAINING Make everyone in the company aware of the risks associated with email, social media and confidential information. 5. GET EVERYONE INVOLVED 3. TREAT IT SECURITY AS A CONTINUOUS ENTERPRISE-WIDE PROCESS Consistently test and re-evaluate existing processes and systems that are designed to minimise the inherent risks.
  • 15. CYBER-SECURITY Defending your future roberthalf.com.au © 2016 Robert Half International Inc. RH-1016 DOWNLOAD YOUR COMPLIMENTARY COPY OF OUR REPORT: