CINXE.COM

Holistic cyber resilience: Strengthen security against growing cyberthreats | Verizon

<!DOCTYPE HTML> <html lang="en_gb"> <head> <title>Holistic cyber resilience: Strengthen security against growing cyberthreats | Verizon</title> <meta charSet='utf-8'/> <meta httpEquiv='X-UA-Compatible' content='IE=edge'/> <meta name='viewport' content='width=device-width,initial-scale=1,minimum-scale=1,viewport-fit=cover'/> <meta name="locale" content="en-nl"/> <meta name="description" content="Discover how businesses can boost cyber resilience with a holistic approach to security, reducing vulnerabilities and managing rising cyber threats with strategic defenses."/> <meta name="keywords" content="cyber resilience, holistic cybersecurity approach, managing cyber threats, strengthen business security, cyber threat protection, business cybersecurity strategy, security vulnerabilities, zero trust and sase solutions, cybersecurity for businesses, it security best practices, cybersecurity for international businesses"/> <link rel="preload" href="https://d23uobcja6cuc.cloudfront.net/business/etc.clientlibs/ves-cake/site.css" as="style" type="text/css"/> <link rel="preload" as="font" type="font/woff2" href="https://scache2.vzw.com/globalnav/fonts/verizon-nhg/VerizonNHGeDS-Bold.woff2" crossorigin/> <link rel="preload" as="font" type="font/woff2" href="https://scache1.vzw.com/globalnav/fonts/verizon-nhg/VerizonNHGeDS-Regular.woff2" crossorigin/> <link rel="preload" as="font" type="font/woff2" href="https://scache1.vzw.com/globalnav/fonts/verizon-nhg/VerizonNHGDS-Light.woff2" crossorigin fetchpriority="low"/> <link rel="preload" as="style" type="text/css" href="https://www.verizon.com/etc/designs/vzwcom/gnav20/core.css" fetchpriority="low"/> <link rel="preload" href="/business/etc.clientlibs/ves/clientlibs/main/resources/scripts/nr.js" as="script" type="text/js" fetchpriority="low"/> <link rel="preload" as="script" type="text/javascript" href="https://vzwb.15gifts.com/leap/web/v2.99.4-fe14b59-vzwb/vendors.partner.js" fetchpriority="low" crossorigin="anonymous"/> <link rel="preload" as="script" type="text/javascript" href="https://www.verizon.com/foryoursmallbiz/lqwidget/business-lq-widget.js" fetchpriority="low" crossorigin="anonymous"/> <link rel="preconnect" href="https://www.googletagmanager.com"/> <link rel="preconnect" href="https://assets.adobedtm.com"/> <link rel="preconnect" href="https://cdn.cookielaw.org"/> <link rel="preconnect" href="https://vzwb.15gifts.com/"/> <link rel="preconnect" href="https://t.contentsquare.net/"/> <!--preload-start--> <link rel="preload" as="image" src="https://d23uobcja6cuc.cloudfront.net/business/dam/img/international/secure-your-business/meeting-multiple-people-creative.webp" fetchpriority="high"/> <link rel="preload" as="image" src="https://d23uobcja6cuc.cloudfront.net/business/dam/images/photography/devices-in-use/man-and-woman-in-glasses-looking-at-computer-1451457339.webp" fetchpriority="high"/> <link rel="preload" as="image" src="https://d23uobcja6cuc.cloudfront.net/business/dam/images/photography/energy-utilities/utility-workers-in-hard-hats-1280.webp" fetchpriority="high"/> <link rel="preload" as="image" src="https://d23uobcja6cuc.cloudfront.net/business/dam/images/photography/devices-in-use/woman-in-airport-terminal-smiling-at-mobile-phone-1609110595.webp" fetchpriority="high"/> <link rel="preload" href="https://ajax.googleapis.com/ajax/libs/jquery/3.7.1/jquery.min.js" as="script" type="text/javascript" fetchpriority="low"/> <link rel="preload" href="https://assets.adobedtm.com/96f174b1df1f/841b4e3cdb43/launch-e41e5dabca84.min.js" as="script" type="text/javascript" fetchpriority="low"/> <link rel="preload" href="/business/etc.clientlibs/ves-cake/site.js" as="script" type="text/javascript" fetchpriority="low"/> <link rel="preload" href="/business/etc.clientlibs/ves-clap/js.js" as="script" type="text/javascript" fetchpriority="low"/> <link rel="preload" href="https://d23uobcja6cuc.cloudfront.net/business/etc.clientlibs/ves-clap/css.css" as="style" type="text/css" fetchpriority="low"/><!--preload-end--> <link rel="icon" type="image/x-icon" href="https://www.verizon.com/favicon.ico"/> <link rel="canonical" href="https://www.verizon.com/business/en-nl/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/"> <meta property="og:url" content="https://www.verizon.com/business/en-nl/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/"/> <meta property="og:title" content="Holistic cyber resilience: Strengthen security against growing cyberthreats | Verizon"/> <meta property="og:description" content="Discover how businesses can boost cyber resilience with a holistic approach to security, reducing vulnerabilities and managing rising cyber threats with strategic defenses."/> <meta name="locale" content="en-nl"/> <meta property="og:type" content="website"/> <meta property="og:site_name" content="Verizon Business"/> <meta property="twitter:site" content="@VerizonBusiness"/> <meta property="twitter:card" content="summary_large_image"/> <link href="/business/en-nl/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="en-us" rel="alternate" /><link href="/business/de-de/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="de-de" rel="alternate" /><link href="/business/en-au/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="en-au" rel="alternate" /><link href="/business/en-gb/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="en-gb" rel="alternate" /><link href="/business/en-nl/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="en-nl" rel="alternate" /><link href="/business/en-sg/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="en-sg" rel="alternate" /><link href="/business/fr-fr/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="fr-fr" rel="alternate" /><link href="/business/ja-jp/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" hreflang="ja-jp" rel="alternate" /> <link rel="stylesheet" href="https://d23uobcja6cuc.cloudfront.net/business/etc.clientlibs/ves-cake/site.css" type="text/css"> <!-- New Relic --> <script type="text/javascript" src="/business/etc.clientlibs/ves/clientlibs/main/resources/scripts/nr.js" async onload="newrelic.setCustomAttribute('pagegen', 'NG24');"></script> <!-- End New Relic --> <script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/3.7.1/jquery.min.js" data-async></script> <!-- Adobe Analytics --> <script> var digitalData = window.digitalData || { pageInfo: {}, page: {}, internalCampaignInfo: {}, visitorProfile: {}, userProfile: {}, formInfo: {}, filterInfo: {}, CommunicationInfo: {} }; // line 5 - 32 digitalData.pageInfo.pageName = 'vbg:emea:nl:en:resources:articles:a-holistic-approach-to-strengthening-cyber-resilience'; digitalData.pageInfo.siteSectionsLevel1 = 'index'; digitalData.pageInfo.siteSectionsLevel2 = 'resources'; digitalData.pageInfo.siteSectionsLevel3 = 'articles'; digitalData.pageInfo.siteSectionsLevel4 = 'a-holistic-approach-to-strengthening-cyber-resilience'; digitalData.pageInfo.siteSectionsLevel5 = 'index:resources:articles:a-holistic-approach-to-strengthening-cyber-resilience'; digitalData.pageInfo.MarketoID = "undefined"; digitalData.pageInfo.MarketoStatus = "undefined"; digitalData.pageInfo.url = window.location.href; digitalData.pageInfo.pageurl = 'https://www.verizon.com/business/en-nl/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/'; digitalData.pageInfo.seoStrategyPageName = 'Holistic cyber resilience: Strengthen security against growing cyberthreats'; digitalData.pageInfo.pageType = 'enterprise: '; digitalData.pageInfo.pageSubType = 'undefined'; digitalData.pageInfo.languageSelected = 'en'; digitalData.pageInfo.siteName = 'Verizon Business Group'; digitalData.pageInfo.brand = 'vbg'; digitalData.pageInfo.areaInterest = 'Security'; digitalData.pageInfo.country = 'nl'; digitalData.pageInfo.region = 'emea'; digitalData.pageInfo.renderedExperience = (window.innerWidth > 1200) ? "large" : ((window.innerWidth < 768) ? "small" : "medium"); digitalData.pageInfo.viewport = window.innerWidth + "x" + window.innerHeight; digitalData.pageInfo.orientation = (window.innerWidth < window.innerHeight) ? "Portrait" : "Landscape"; // line 39 digitalData.internalCampaignInfo.internalSearchNumberOfResults = "undefined"; // line 42 - 47 digitalData.visitorProfile.userProfileStateAuthentication = "undefined"; digitalData.visitorProfile.userLoginStart = "undefined"; digitalData.visitorProfile.userLoginComplete = "undefined"; digitalData.visitorProfile.userRegistrationStart = "undefined"; digitalData.visitorProfile.userRegistrationComplete = "undefined"; digitalData.visitorProfile.zipCode = ""; // line 81 - 85 digitalData.formInfo.formName = "undefined"; digitalData.formInfo.formType = "undefined"; digitalData.formInfo.formGate = "undefined"; digitalData.formInfo.formFieldName = "undefined"; digitalData.formInfo.errorMessage = "undefined"; // line 89 - 91 digitalData.filterInfo.filterType = "undefined"; digitalData.filterInfo.filterValue = "undefined"; digitalData.filterInfo.filterSelected = "undefined"; // line 95 - 98 digitalData.CommunicationInfo.communicationType = "undefined"; digitalData.CommunicationInfo.communicationType = "undefined"; digitalData.CommunicationInfo.surveyId = "undefined"; digitalData.pageInfo.chatOff=''; </script> <script src='https://assets.adobedtm.com/96f174b1df1f/841b4e3cdb43/launch-e41e5dabca84.min.js' async defer></script> <!-- End Adobe Analytics --> <!-- Google Tag Manager --> <script> if (false) { if (typeof(dataLayer)=="undefined") { dataLayer=[]; } dataLayer.push({'chat_off':true}); } (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.defer=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl; //document.addEventListener("DOMContentLoaded",function(){f.parentNode.insertBefore(j,f)}); setTimeout(function(){f.parentNode.insertBefore(j,f)},1200); })(window,document,'script','dataLayer','GTM-W2VN2CQ'); </script> <!-- End Google Tag Manager --></head> <body> <header role="banner" class=" cta"> <link rel="stylesheet" type="text/css" href="https://www.verizon.com/etc/designs/vzwcom/gnav20/core.css"/> <style> header { overflow:visible;min-height:69px; } .gnav20-ribbontext+div .gnav20-main { min-height: 80px; } </style> <div id="vz-gh20"></div> <script type="text/javascript"> var gnavdl = {"host":"https://www.verizon.com","bu":"smb", "appid":"meganav-en-nl", "variation":"", "impltype":"NOTssi", "json":"", "yextSearchURL":"https://sitesearchbar-iframe.verizon.com.pagescdn.com/"} if (typeof(MP)=="undefined"){ window.MP={init:function(){}} }; function checkNav() { var t=document.getElementById("vz-gh20"); if (t && !t.children.length) { if (typeof(gnav20)!="undefined" && !gnav20.context){ gnav20.context=gnavdl.bu+gnavdl.appid+gnavdl.variation; console.log("nav missing"); gnav20.loadHeader(gnav20.context); } } } function checkNavt() { setTimeout(checkNav,2750); } if (gnavdl.bu){ document.addEventListener("DOMContentLoaded",function(){ if (typeof(gnav20)=="undefined") { var j=document.createElement("script"); //j.src=[gnavdl.host,"etc/designs/vzwcom/gnav20",gnavdl.bu+".js"].join("/"); j.src=[ ,"etc/designs/vzwcom/gnav20",gnavdl.bu+".js"].join("/"); j.async=true; j.onload=checkNavt; document.head.appendChild(j); } }); } </script> <div class="secondarynav cup "> <ul class="breadcrumb-list" aria-label="Breadcrumb"> <li><a class="vz-text-link" href="https://www.verizon.com/business/en-nl/" data-loc="Secondary Nav:Breadcrumb">Global Index</a></li> <li><a class="vz-text-link" href="https://www.verizon.com/business/en-nl/resources/" data-loc="Secondary Nav:Breadcrumb">Business Resources and Industry Insights</a></li> <li><a class="vz-text-link" href="https://www.verizon.com/business/en-nl/resources/articles/" data-loc="Secondary Nav:Breadcrumb">Articles</a></li> <li><a class="vz-text-link" href="https://www.verizon.com/business/en-nl/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience/" data-loc="Secondary Nav:Breadcrumb">Holistic cyber resilience: Strengthen security against growing cyberthreats</a></li> </ul> <div> <!-- BCCTA --><a class="vz-button-link contact-us primary button small" href="/business/en-nl/contact/request-consultation/"><span>Contact Us</span></a><!-- /BCCTA --> </div> </div> </header> <div> <div class="cakeContent"> <div id="Cffffe776" class="Cffffe776 contain indent cup half reverse gap" aria-labelledby="hCffffe776" role="region"> <style type="text/css"> .background.Cffffe776 { background-color:#f3ede0; background-position:right top; background-size:cover; } .Cffffe776>.primary>.background { background-color:#F3EDE0; } .Cffffe776>.secondary>.background { background-color:#F3EDE0; } .secondary> .background.Cffffe776 { background-image:url(https://d23uobcja6cuc.cloudfront.net/business/dam/img/international/secure-your-business/meeting-multiple-people-creative.webp); } </style> <div class="background Cffffe776 bleed light fill "> </div> <div class="aspect alarge mcard"> <div class="plate Cffffe776 half reverse gap "> <div class="primary light hasbg middle"> <div class="background bleed light "> </div> <div> <h1 id="hCffffe776" class="head align-left thin mw12"><span style="color: rgb(245,10,35);">A holistic approach to strengthening cyber resilience</span></h1> <div class="ctas align-left"> <a id="lCb365" class="trans button vz-button-link" target="_blank" href="/business/resources/articles/a-holistic-approach-to-strengthening-cyber-resilience.pdf" data-title="A holistic approach to strengthening cyber resilience" data-loc="Content:Button:Holistic cyber resilience: Strengthen security against growing cyberthreats:A holistic approach:Download report" data-uuid="664c61cb-0929-4f31-a9b4-0f76cda75d55" aria-labelledby="lCb365 hCffffe776">Download report</a> </div> </div> </div> <div class="secondary light hasbg middle"> <div class="background Cffffe776 bleed hasimg light "> </div> <div> </div> </div> </div> </div> </div> <!--end/Cffffe776--> </div> <div class="cakeContainer"> <div id="Cffff886f" class="Cffff886f contain cup full anchornav"> <style> </style> <div class="fullcontent nav"> <div class="nav align-left buttons "> <ul> <li><a class="vz-text-link" data-loc="Content:Nav::overview" href="#overview"> Overview</a></li> <li><a class="vz-text-link" data-loc="Content:Nav::managing-threats" href="#managing-threats">Managing threats</a></li> <li><a class="vz-text-link" data-loc="Content:Nav::increased-vulnerabilities" href="#increased-vulnerabilities"> Increased vulnerabilities</a></li> <li><a class="vz-text-link" data-loc="Content:Nav::the-right-fit" href="#the-right-fit"> The right fit</a></li> <li><a class="vz-text-link" data-loc="Content:Nav::basic-steps" href="#basic-steps">Basic steps</a></li> <li><a class="vz-text-link" data-loc="Content:Nav::holistic-approach" href="#holistic-approach">Holistic approach</a></li> <li><a class="vz-text-link" data-loc="Content:Nav::let&#39;s-connect" href="#let%27s-connect">Let&#39;s connect</a></li> </ul> </div> </div> <div class="primary " data-n="9"> <div class="anchor full"> <div id="C378a" class="C378a contain indent cup full gapabove" aria-labelledby="hC378a" role="region"> <style type="text/css"> </style> <a name="overview" data-name="overview" id="overview"></a> <div class="plate C378a full nobg "> <div class="primary top"> <h2 id="hC378a" class="headM align-left thin mw10">How businesses can <span style="color: rgb(245,10,35);">boost their resilience</span> in the face of increasing cyberthreats</h2> <div class="text align-left bodyMD thin mw10 "> <p>With the level and sophistication of cyberthreats increasing, how can businesses ensure they remain protected? The key is taking a more holistic view.</p> </div> </div> </div> </div> <!--end/C378a--> <div id="Cfffff493" class="Cfffff493 contain indent cup half gapbelow"> <style type="text/css"> .background.Cfffff493 { background-color:#F3EDE0; background-position:center; background-size:cover; } .secondary> .background.Cfffff493 { background-image:url(https://d23uobcja6cuc.cloudfront.net/business/dam/images/photography/devices-in-use/man-and-woman-in-glasses-looking-at-computer-1451457339.webp); } </style> <div class="background Cfffff493 rounded light "> </div> <div class="aspect acinema mtall"> <div class="plate Cfffff493 half "> <div class="primary light middle"> <div> <div class="text align-left mw11 "> <p>As technology advances and businesses in all sectors become ever more connected, the risk of cyberthreats continuously increases, too. Cybercriminals are becoming more sophisticated every day. And with businesses increasing their reliance on digital tools and processes – with greater amounts of data stored and shared in the cloud—each organisation’s attack surface also grows.</p> <p>To keep themselves protected, businesses need a robust cybersecurity program that meets the specific needs of their organisation and the regulatory environment they operate in.</p> </div> </div> </div> <div class="secondary hasbg split"> <div class="background Cfffff493 rounded hasimg light "> </div> <div> </div> </div> </div> </div> </div> <!--end/Cfffff493--> <div id="C7226" class="C7226 contain cup full columns" data-label="Managing threats"> <style> .C7226 .scroller .items { width: 66%; } @media (max-width: 760px) {.C7226 .scroller .items { width: 200%; }} @media (min-width: 1280px) { .C7226 .scroller.bleed .items { width: calc(66 * 12.8px + 100vw - 1304px); } </style> <a name="managing-threats" data-name="managing-threats" id="managing-threats"></a> <div class="primary " data-n="2"> <div class="columns mStack"> <div class="crow c3 full nobg" data-n="2"> <div class="double"> <div id="Cffff5787" class="Cffff5787 contain indent cup full" aria-labelledby="hCffff5787"> <style type="text/css"> </style> <div class="plate Cffff5787 full nobg "> <div class="primary top"> <h2 id="hCffff5787" class="headS align-left bold mw10">Managing growing threats</h2> <div class="text align-left mw10 "> <p>Cyberthreats are on the rise. The Verizon Business 2024 Data Breach Investigations Report<sup>1</sup> analysed 30,458 real-world security incidents—10,626 of which were confirmed data breaches affecting victims in 94 countries. The report shows a substantial growth in attacks involving the exploitation of vulnerabilities—up a staggering 180% compared with the previous year—and the main point of entry for these attacks was web applications.&nbsp;</p> <p>Roughly one-third of attacks involved ransomware—something that is still a major concern for 92% of industries, as the cost of an attack can be significant. According to the FBI’s Internet Crime Complaint Center (IC3) ransomware complaint data, the median loss associated with the combination of Ransomware and other Extortion breaches is $46,000 (ranging between $3 and $1,141,467 for 95% of cases).<sup>2</sup></p> <p>However, it’s not just the number of threats that businesses should be concerned about. Cybercriminals are also increasing their capabilities, devising more sophisticated attacks to beat the latest technologies that thwart attacks and prevent data loss, and regulations that increase an organisation’s diligence. As ANSSI’s Panorama of Cyberthreats 2022 says, “malicious actors are continuously improving their capabilities for financial gain, espionage, and destabilisation. This improvement is illustrated in particular in the targeting of attackers who seek to obtain discreet and permanent access to their victims’ networks.”<sup>3</sup></p> </div> </div> </div> <span class=" align-left"><p class="disclaimer"><sup>1 </sup>2024 <a href="https://www.verizon.com/business/resources/reports/dbir/">Data Breach Investigations report</a>. (n.d.). Verizon Business.</p><p class="disclaimer"><sup>2</sup>2024 <a href="https://www.verizon.com/business/resources/reports/dbir/">Data Breach Investigations report</a>. (n.d.). Verizon Business.</p><p class="disclaimer"><sup>3</sup>ANSSI. (2022). <a href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2023-CTI-001.pdf">PANORAMA DE LA CYBERMENACE 2022</a>. In ANSSI. </p></span> </div> <!--end/Cffff5787--> </div> <div id="Cffffb865" class="Cffffb865 contain cup full gap columns"> <style> .background.Cffffb865 { background-color:#F3EDE0; background-position:center; background-size:contain; } .Cffffb865 .scroller .items { width: 400%; } @media (max-width: 760px) {.Cffffb865 .scroller .items { width: 400%; }} @media (min-width: 1280px) { .Cffffb865 .scroller.bleed .items { width: calc(400 * 12.8px + 100vw - 1304px); } </style> <div class="background Cffffb865 rounded light "> </div> <div class="primary light" data-n="4"> <div class="columns mStack"> <div class="crow c1 full gap light " data-n="4"> <div id="Ca74d" class="Ca74d contain indent cup full gap" aria-labelledby="hCa74d" role="region"> <style type="text/css"> </style> <div class="plate Ca74d full gap nobg "> <div class="primary middle"> <div> <h2 id="hCa74d" class="headS align-left bold mw">Cyberthreats are <br />on the rise</h2> <div class="text align-left bodySL mw "> <p>The Verizon Business 2024 Data Breach Investigations Report analysed:&nbsp;</p> </div> </div> </div> <div class="secondary top empty"> </div> </div> </div> <!--end/Ca74d--> <div id="Cffffc754" class="Cffffc754 contain indent cup full" aria-labelledby="hCffffc754" role="region"> <style type="text/css"> </style> <div class="aspect askinny"> <div class="plate Cffffc754 full nobg "> <div class="primary top"> <h3 id="hCffffc754" class="headM align-left thin mw"><span style="color: rgb(245,10,35);">30,458</span></h3> <div class="text align-left bodySL mw "> <p>real-world security incidents</p> </div> </div> </div> </div> </div> <!--end/Cffffc754--> <div id="Cd706" class="Cd706 contain indent cup full" aria-labelledby="hCd706" role="region"> <style type="text/css"> </style> <div class="aspect askinny"> <div class="plate Cd706 full nobg "> <div class="primary top"> <h2 id="hCd706" class="headM align-left thin mw"><span style="color: rgb(245,10,35);">10,626</span></h2> <div class="text align-left bodySL mw "> <p>of which were confirmed data breaches affecting victims in</p> </div> </div> </div> </div> </div> <!--end/Cd706--> <div id="C4100" class="C4100 contain indent cup full" aria-labelledby="hC4100" role="region"> <style type="text/css"> </style> <div class="aspect askinny"> <div class="plate C4100 full nobg "> <div class="primary top"> <h2 id="hC4100" class="headM align-left thin mw"><span style="color: rgb(245,10,35);">94</span></h2> <div class="text align-left bodySL mw "> <p>countries</p> </div> </div> </div> </div> </div> <!--end/C4100--> </div> </div> </div> </div> <!--end/Cffffb865--> </div> </div> </div> </div> <!--end/C7226--> <div id="C9699" class="C9699 contain indent cup full" aria-labelledby="hC9699" role="region"> <style type="text/css"> </style> <a name="increased-vulnerabilities" data-name="increased-vulnerabilities" id="increased-vulnerabilities"></a> <div class="plate C9699 full nobg "> <div class="primary top"> <h2 id="hC9699" class="headS align-left bold mw10">Increased vulnerabilities</h2> <div class="text align-left mw10 "> <p>Advances in technology, network capabilities and working practices have meant organisations need to be aware of the increased vulnerabilities that cybercriminals can exploit. “The key element to consider is the development of remote working and the hybridisation of organisations, which has redefined the contours of information systems security,” says Steven Gevers, Associate Director, Security Consulting Services for Verizon Business.&nbsp;</p> <p>As discussed in the DBIR, breaches caused by vulnerabilities have tripled recently — driven, largely in part, by the impact of Zero-day attacks. So, it’s essential for businesses to remain on top of basic security hygiene. It also shows how important concepts such as Zero Trust and Defense in Depth continue to be. “It’s critical to have a consolidated view on which parts of your organisation expose you to the biggest risk,” Gevers says, “so you can spend your security budget where it brings most value.”</p> <p>Problems can also arise when employees try to take matters into their own hands. Today’s workers are used to operating in a fast-paced, digital way. If they can’t quickly find solutions to a problem, they can often be tempted to – perhaps unintentionally - breach security protocols and use unsanctioned and unprotected applications, software or hardware. A study by Harvard Business Review showed that 67% of respondents had failed to fully adhere to cybersecurity policies at least once<sup>4</sup>. This so-called shadow IT can open up extra vulnerabilities, giving the criminals another potential point of entry.</p> </div> </div> </div> <span class=" align-left"><p class="disclaimer"><sup>4</sup>Verizon. (2023).<a href="/business/content/dam/resources/reports/2023/mobile-security-index-report.pdf"> 2023 Mobile Security Index whitepaper</a></p></span> </div> <!--end/C9699--> <div id="C1f6d" class="C1f6d contain indent cup full" aria-labelledby="hC1f6d" role="region"> <style type="text/css"> </style> <a name="the-right-fit" data-name="the-right-fit" id="the-right-fit"></a> <div class="plate C1f6d full nobg "> <div class="primary top"> <h2 id="hC1f6d" class="headS align-left bold mw10">Finding the right fit for security</h2> <div class="text align-left mw10 "> <p>Faced with this increase in cyberthreats, many businesses have adopted Zero Trust and SASE solutions. And while this is great for strengthening network security, it’s important to also step back and look at how everything works together. “Different business units have their own business applications; they have their own processes, their own needs,” says Stephen Young, Director, Cyber Defense Consulting Services for Verizon Business. “Security has multiple dynamics, impacting the environment to deal with the various types of attacks. There is no single solution that fits all. Security resilience therefore has to go further than just Zero Trust and SASE.”</p> </div> </div> </div> </div> <!--end/C1f6d--> <div id="C570a" class="C570a contain indent cup half"> <style type="text/css"> .background.C570a { background-color:#F3EDE0; background-position:center; background-size:cover; } .primary> .background.C570a { background-image:url(https://d23uobcja6cuc.cloudfront.net/business/dam/images/photography/energy-utilities/utility-workers-in-hard-hats-1280.webp); } </style> <div class="background C570a rounded flush light "> </div> <div class="aspect alarge mtall"> <div class="plate C570a half "> <div class="primary light hasbg middle"> <div class="background C570a rounded hasimg light "> </div> <div> </div> </div> <div class="secondary middle"> <div> <div class="text align-indent bodyMD thin mw8 "> <p>“There is no single solution that fits all. Security resilience therefore has to go further than just Zero Trust and SASE.”</p> <p><b>Stephen Young</b><br> Director, Cyber Defense Consulting Services for Verizon Business</p> </div> </div> </div> </div> </div> </div> <!--end/C570a--> <div id="Ced8e" class="Ced8e contain indent cup full gapabove" aria-labelledby="hCed8e" role="region"> <style type="text/css"> </style> <a name="basic-steps" data-name="basic-steps" id="basic-steps"></a> <div class="plate Ced8e full nobg "> <div class="primary top"> <h2 id="hCed8e" class="headS align-left bold mw10">Getting the basics right</h2> <div class="text align-left mw10 "> <p>Sometimes, businesses are looking so closely at the bigger security threats that they lose sight of the simple, fundamental elements of their setup. “The more complex the situation, the greater the threat, the more companies tend to neglect the fundamentals,” Young says. “It is the fundamental principles that constitute the relevance of an effective security policy.”</p> <p>While businesses need to take a wider look at the security of their overall infrastructure and find solutions to the big problems, it’s essential not to forget the basic security steps—like updating systems and correctly setting up firewalls. By keeping these bases covered, IT teams may not only prevent small security threats creeping in, but they may also avoid wasting money on unnecessary security tools.</p> </div> </div> </div> </div> <!--end/Ced8e--> <div id="C1898" class="C1898 contain indent cup full" aria-labelledby="hC1898" role="region"> <style type="text/css"> </style> <a name="holistic-approach" data-name="holistic-approach" id="holistic-approach"></a> <div class="plate C1898 full nobg "> <div class="primary top"> <h2 id="hC1898" class="headS align-left bold mw10">Taking a more holistic approach</h2> <div class="text align-left mw10 "> <p>The temptation for many businesses is to increase security by adding multiple extra layers. But this can actually be counterproductive, creating even greater complexity and cost. Instead, it’s better to look at the whole picture and evaluate what’s needed, where and for what reasons. That’s why Verizon takes a more holistic approach based on an in-depth understanding of a business—looking at everything from the organisation’s operational ecosystem down to the needs of its individual users.</p> <p>To do this, Verizon aligns to the National Institute of Standards in Technology’s (NIST) security framework, which is based on five key axes<sup>5</sup>:</p> <ul> <li>Identification</li> <li>Protection</li> <li>Detection</li> <li>Response</li> <li>Recovery</li> </ul> <p>Verizon can conduct detailed security evaluations to understand a company’s specific needs. Then we help them deploy customised security measures to meet those needs.</p> <p>&nbsp;“Every organisation has its own culture and risk appetite, resulting in a different approach to security,” says Steven Gevers, Associate Director, Security Consulting for Verizon Business.</p> <p>&quot;Some organisations might find technologies such as Generative AI an intellectual property risk that needs to be blocked; others think it's a business enabler that requires some coaching. We help our customers improve their security maturity; focusing on the biggest threats—but keeping in mind business requirements. Adopting Defense in Depth – using multiple security measures to protect an organisation's assets – is key to this. Organisations can have flexibility on one level while keeping risk acceptable with controls at another level. If one layer is compromised, the additional layers may stop the attack or reduce its impact.”</p> <p>Not only does this approach help to create the most robust set of IT defences, but it also enables businesses to manage costs more effectively, investing in the right solutions for their needs and managing their budgets more wisely. “When you have a global vision of the needs of the business and provide tailor-made solutions, it avoids the multiplication of redundant security solutions,&quot; Young says. “A rationalisation that allows better cost control.”</p> <p>With this more holistic approach to security, businesses can better achieve the right security setup that meets their needs and their budget. And they can be better prepared to keep the cybercriminals at bay.</p> <p>&nbsp;</p> </div> </div> </div> <span class=" align-left"><p class="disclaimer"><sup>5</sup>National Institute of Standards and Technology. (2024). <a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf">The NIST Cybersecurity Framework</a> (CSF) 2.0. In NIST CSWP 29</p></span> </div> <!--end/C1898--> <div id="Cffffdc85" class="Cffffdc85 contain indent cup seven reverse gapabove gapbelow" aria-labelledby="hCffffdc85" role="region"> <style type="text/css"> .background.Cffffdc85 { background-color:#F3EDE0; background-position:left top; background-size:cover; } .secondary> .background.Cffffdc85 { background-image:url(https://d23uobcja6cuc.cloudfront.net/business/dam/images/photography/devices-in-use/woman-in-airport-terminal-smiling-at-mobile-phone-1609110595.webp); } </style> <a name="let&#39;s-connect" data-name="let&#39;s-connect" id="let&#39;s-connect"></a> <div class="background Cffffdc85 rounded flush light "> </div> <div class="aspect alarge mtall"> <div class="plate Cffffdc85 seven reverse "> <div class="primary light middle"> <div> <h3 id="hCffffdc85" class="headM align-left thin mw11">Talk to us</h3> <div class="text align-left mw11 "> <p style="max-width: 95%;">Find out how Verizon can help you mitigate cyberthreats with the right holistic security solution for your business.&nbsp;</p> <p style="max-width: 95%;">Sign up for emails to learn more about our security and SASE solutions.&nbsp;</p> </div> <div class="ctas align-left"> <a id="lCe1b4" class="link vz-text-link" href="/business/en-nl/resources/lp/secure-access-service-edge/" data-title="Secure Access Service Edge (SASE) Security Solutions for Business" data-loc="Content:Link:Holistic cyber resilience: Strengthen security against growing cyberthreats:Let&#39;s connect:Learn more" aria-labelledby="lCe1b4 hCffffdc85">Learn more</a> <a id="lCe1b5" class="link vz-text-link" href="/business/en-nl/contact-us/" data-title="Contact us" data-loc="Content:Link:Holistic cyber resilience: Strengthen security against growing cyberthreats:Let&#39;s connect:Sign up" aria-labelledby="lCe1b5 hCffffdc85">Sign up</a> </div> </div> </div> <div class="secondary hasbg middle"> <div class="background Cffffdc85 rounded hasimg light "> </div> <div> </div> </div> </div> </div> </div> <!--end/Cffffdc85--> </div> </div> </div> <!--end/Cffff886f--> </div> </div> <script type="text/javascript" src="/business/etc.clientlibs/ves-cake/site.js"></script> <div class="cakeContainer"><div id="Ca03" class="Ca03 contain cup full gapabove gapbelow columns" data-label="Contact"><style>.background.Ca03{background-color:#000;background-position:center;background-size:contain}.Ca03 .scroller .items{width:300%}@media (max-width:760px){.Ca03 .scroller .items{width:300%}}@media (min-width:1280px){.Ca03 .scroller.bleed .items{width:calc(300 * 12.8px + 100vw - 1304px)}}</style><a data-name="contact" id="contact"></a><div class="background Ca03 rounded flush dark"></div><div class="primary dark" data-n="3"><div class="columns mStack"><div class="crow c1 full dark" data-n="3"><div id="C661e" class="C661e contain indent cup five reverse" aria-labelledby="hC661e" role="region"><style type="text/css">.background.C661e{background-color:unset;background-position:left bottom;background-size:contain}.C661e>.primary>.background,.C661e>.secondary>.tabs::before{background-color:#000}.C661e>.secondary>.background,.C661e>.secondary>.tabs{background-color:#1b1c1d}</style><div class="background C661e rounded"></div><div class="plate C661e five reverse"><div class="primary dark hasbg top"><div class="background rounded"></div><h2 id="hC661e" class="head align-left thin mw">Let’s<br/>connect</h2><div class="text align-"><div class="phone2 contact"><select class="phonecountry"><option value="+54 11 4515-6100">Argentina<option value="+61-2-9434-5000">Australia<option value="+43 1 727 14 1111">Austria<option value="+32 2 400 80 00">Belgium<option value="+55 11 3318-4000">Brazil<option value="+1 800 463 8123">Canada<option value="+56.2.754.5500">Chile<option value="+86-21-2330-3600">China<option value="+57 1 376 5566">Colombia<option value="+50 7 213-3070">Costa Rica<option value="+45 4386 9000">Denmark<option value="+46 8 5661 7000">Finland<option value="+33 1 53 75 82 00">France<option value="+49 231 9720">Germany<option value="+852-2233-6288">Hong Kong<option value="+912-2-6648-1661">India<option value="+353 01 413 1250">Ireland<option value="+39 02 36 00 11">Italy<option value="+81-3-5293-9000">Japan<option value="+82-2-6281-7900">Korea<option value="+32 2 400 80 00">Luxembourg<option value="+(52 55)9000-7900">Mexico<option value="+31 20 711 2000">Netherlands<option value="+64-9-306-8911">New Zealand<option value="+47 24 13 04 00">Norway<option value="+50 7 213-3070">Panama<option value="+34 91 414 5700">Portugal<option value="+65-6248-6600">Singapore<option value="+34 91 414 5700">Spain<option value="+46 8 5661 7000">Sweden<option value="+41 44 580 80 11">Switzerland<option value="+886-2-2723-8877">Taiwan<option value="+44 118 905 5000">United Kingdom<option selected="selected">United States<option value="+58-212-285 2833">Venezuela</select> <svg width="12" height="12" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path vector-effect="non-scaling-stroke" stroke="#fff" fill="none" d="M22,7L12,17L2,7"/></svg><style>select.phonecountry{border:none;background:0 0;color:inherit;text-decoration:underline;cursor:pointer;appearance:none;position:relative;padding-right:16px}select.phonecountry option{background:#fff;color:#000}select.phonecountry+svg{vertical-align:middle;margin-left:-16px}</style><script>!function(){function e(e,t){e&&(e.setAttribute("href","tel:"+t),e.innerHTML=e.innerHTML.replace(/\+?[\d\(][\d\-\.A-Z\ \(\)]+/,t.replace(/\+1/,"")))}const t=document.querySelector("select.phonecountry");t.addEventListener("change",(function(n){e(document.getElementById("lcTFN"),t.value),e(document.querySelector(".secondarynav a.contact-us[href^=tel]"),t.value),t.blur()})),t.querySelector("option:not([value])").setAttribute("value",digitalData.pageInfo.tfn)}()</script></div></div></div><div class="secondary dark hasbg bottom empty"><div class="background rounded"></div><div></div></div></div></div><div id="Cc982" class="Cc982 contain cup full gap gapabove columns"><style>.background.Cc982{background-color:rgba(255,255,255,0);background-position:center;background-size:contain}.Cc982 .scroller .items{width:100%}@media (max-width:760px){.Cc982 .scroller .items{width:200%}}@media (min-width:1280px){.Cc982 .scroller.bleed .items{width:calc(100 * 12.8px + 100vw - 1304px)}}</style><div class="background Cc982 flush light"></div><div class="primary light" data-n="2"><div class="columns mStack"><div class="crow c2 full gap light" data-n="2"><div id="C5f17" class="C5f17 contain indent cup full"><style type="text/css">.background.C5f17{background-color:#f6f6f6;background-position:center;background-size:contain}</style><div class="background C5f17 rounded light"></div><a class="full vz-text-link" href="#marketo" data-loc="Content:Link:Contact EMEA English:Contact:null"></a><div class="plate C5f17 full"><div class="primary light top"><picture class="icon headS rounded align-left"><source type="image/svg+xml" srcset="https://d23uobcja6cuc.cloudfront.net/business/dam/images/icons/devices/support.svg"/><svg id="ee26bdc4-7664-4c98-a495-cc9f16e1f58e" data-name="Ebene 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 21.6 21.6"><path d="M19.8,10.75h0a9,9,0,1,0-9,9.07V18.68a7.9,7.9,0,0,1-7-4.2l2.35-.41L5.4,9.61,3,10a7.88,7.88,0,0,1,15.68,0L16.26,9.6l-.78,4.47,3.62.64.69-3.91h0Zm-15.31.16.39,2.25-1.41.25-.39-2.25Zm13.7,2.49-1.41-.24.4-2.25,1.4.25Z"/></svg></picture><div class="text align-left mw"><p>Get updates<br><a class="bodyMD link" href="data-fancybox=" data-loc="Content:Button:Sign up" style="font-weight:400;color:#000">Sign up for insights</a></div><div class="ctas align-left"></div></div></div></div><div id="C35b1" class="C35b1 contain indent cup full"><style type="text/css">.background.C35b1{background-color:#f6f6f6;background-position:center;background-size:contain}</style><div class="background C35b1 rounded light"></div><a class="full vz-text-link" href="/business/contact/request-consultation/" data-title="Request a sales consultation" data-loc="Content:Link:Contact EMEA English:Contact:Contact Us" aria-label="Contact Us"></a><div class="plate C35b1 full"><div class="primary light top"><picture class="icon headS rounded align-left"><source type="image/svg+xml" srcset="https://www.verizon.com/business/dam/images/icons/devices/Phone-data.svg"/><svg id="Layer_1" data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 21.6 21.6"><path d="M13.3623,11.25476h-1.125V7.27917h1.125ZM15.8407,1.8v18H5.75928V1.8ZM14.7157,16.665H11.85449v1.09668H9.74561V16.665H6.88428v2.01H14.7157Zm0-13.74H6.88428V15.54H14.7157ZM11.36279,8.27917h-1.125v3h1.125Zm-2.00049,1H8.2373v1.97559h1.125Z"/></svg></picture><div class="text align-left mw"><p>Have us contact you<br><a class="bodyMD link" href="https://www.verizon.com/business/contact/request-consultation" style="font-weight:400;color:#000">Request for consultation</a></div><div class="ctas align-left"></div></div></div></div></div></div></div></div><div id="Cb3ac" class="Cb3ac contain indent cup full"><div class="plate full Cb3ac"><div class="fullcontent"><div class="text align-null dim mw"><div class="background flush">&nbsp;</div><div><p class="letslinks">Already have an account?&nbsp; &nbsp;<a class="link vz-text-link" href="https://mblogin.verizonwireless.com/account/business/signin">Log in</a> <a class="link vz-text-link" href="/business/support/">Explore support</a></div></div></div></div></div></div></div></div></div></div><div class="hardCode"><style type="text/css">p.letslinks a.link{display:inline-block;margin-right:40px;font-weight:400;white-space:nowrap}@media (max-width:760px){#Ca03 .text{margin-top:0;clear:none}#Ca03 .plate>.primary{padding-left:36px;padding-bottom:0}}p.letslinks a.link:after{opacity:.7}.chatTile{position:absolute;top:0;right:0;bottom:0;left:0}.chatTile:empty{background:#1b1c1d}#Ca03 h2{margin-top:16px}#Ca03 h2+.text{position:absolute;top:16px}#Ca03 .ctas,#Cffff9b09 .text>p{margin-bottom:0}#Ca03 .crow.gap{padding-bottom:0}#C661e .secondary{min-height:154px}#C661e .background{background-position:center bottom;background-size:contain;background-repeat:no-repeat}@media (min-width:760px){#C661e .plate>.primary{background-color:#1b1c1d;color:#fff;border-radius:12px 0 0 0;min-height:205px;padding-top:42px}#C661e .plate>.secondary .background{border-radius:0 12px 0 0}}@media (min-width:992px){#C661e .plate>.primary{min-height:247px}}</style><div style="display:none" id="evMktoFormThankYou"><h3>Thank you for signing up</h3></div><script>document.addEventListener("DOMContentLoaded",(function(){const n=document.querySelector("#C661e .secondary>.background");if(n){const o="/business/dam/images/photography/contact/contact-",a=["randi-h","john-w","erik-f","maura-h"];n.style.backgroundImage="url("+o+a[Math.floor(Math.random()*a.length)]+".jpg)"}$("#C5f17 a.full").fancybox()}))</script></div><div class="lightbox"><div id="marketo" class="lightbox" style="display:none"><div class="cq-Editable-dom marketoForm narrow nested"><article><div class="clap-blade contain indent"><div><form id="mktoForm_7519" data-mkto="157-IPW-846" data-purpose="optin" action="#evMktoFormThankYou"></form></div></div></article><script async="" src="/business/etc.clientlibs/ves-clap/js.js"></script><link rel="stylesheet" href="https://d23uobcja6cuc.cloudfront.net/business/etc.clientlibs/ves-clap/css.css" type="text/css"></div><div class="lightbox-buttons fancybox-navigation"><button data-fancybox-prev="" class="fancybox-button fancybox-button--arrow_left" title="Previous"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" alt="Scroll Left" width="20" height="20" viewBox="0 0 18 18"><polygon fill="currentColor" points="9.321,17.835 10.116,17.04 2.64,9.562 18,9.562 18,8.438 2.64,8.438 10.116,0.96 9.321,0.165 0.485,9"/></svg></button> <button data-fancybox-next="" class="fancybox-button fancybox-button--arrow_right" title="Next"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" alt="Scroll Right" width="20" height="20" viewBox="0 0 18 18"><polygon fill="currentColor" points="8.679,0.165 7.884,0.96 15.36,8.438 0,8.438 0,9.562 15.36,9.562 7.884,17.04 8.679,17.835 17.515,9"/></svg></button></div></div></div> <footer> <div id="vz-gf20"></div> <div class="server" style="position:absolute; opacity:0" aria-hidden="true">AWSFE6</div> </footer> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10