A new study shows that the biggest infrastructure companies can deliver the same level of security as a $200 million private company.
The report, “Infrastructure Security: Best Practices and Challenges,” from researchers at the cybersecurity consultancy Accenture and cybersecurity firm Mandiant, was released last week.
The report shows that when companies are working on infrastructure security, they should invest more in data protection, better monitoring of infrastructure, and a proactive effort to fix vulnerabilities.
The findings come as more than 500,000 private companies and government agencies worldwide are at risk of being hacked and attacked, the report says.
“The threat is growing exponentially,” says Amit Jain, Accenture’s senior vice president of global infrastructure security.
“We are in a time of unprecedented vulnerabilities in infrastructure, including in the cloud and in public transportation.”
Jain says the report shows how infrastructure companies should take advantage of data protection technologies, such as the cloud security technologies that Google has recently rolled out, and the “network neutrality” principles of the Internet Corporation for Assigned Names and Numbers (ICANN).
“We’re not doing this because we’re greedy, we’re doing it because it makes business sense,” he says.
“This is about making sure the security of our data, and how we secure our infrastructure is as good as it possibly can be.”
Jains says that as companies and governments grapple with this security challenge, they also need to think about how they can make the biggest investments possible in data security, security of data, cybersecurity, and cybersecurity.
“We want to do everything we can to make our systems more resilient,” he adds.
“Data and cybersecurity are the biggest risk, and we need to be proactive about what we can do to mitigate those risks.”
The report looks at data protection and cybersecurity and security of information in the public, private, and public sectors.
It uses the latest tools to find how companies protect data and how they secure their networks.
For example, it looks at how companies can implement secure encryption for the cloud, and then compares that to how they deal with data in the real world.
The study also looked at how different types of data are protected and how companies are managing their data.
It looked at the types of security vulnerabilities that can occur when information moves across the internet and looked at a company’s efforts to prevent those vulnerabilities.
It looks at cybersecurity, including the threat of hacking, the way that cybercriminals can exploit vulnerabilities and the threat posed by malware.
“What we’re seeing is that the more data and data flows across the Internet, the more the potential for data breaches becomes,” Jain says.
The companies analyzed the information they collected from public and private sector organizations.
They looked at vulnerabilities in public and internal networks, as well as in the security posture of the data stored in the data centers of those companies.
They also looked into what types of services and information they store on their data centers and in the datacenters that are owned by the companies.
“This is a massive amount of information that we don’t even know what it’s going to be,” says Jain.
“So, it’s a great time to look at it.”
Jaine says that the study also looks at the companies’ use of data security tools and the types they use to protect the data they store.
The analysis looks at public and proprietary cloud services, as opposed to private and public cloud services.
The analysis focuses on public cloud, such that it includes services such as Amazon Web Services and Google Cloud Platform, but not the companies that have built private cloud services such like Amazon S3 and Google Compute Engine.
“Private cloud is not what we are most interested in in this study,” says Kunal Dhillon, a senior analyst with Mandiant’s Cloud Security team.
“It is only relevant in the context of the public cloud.”
He adds that in the private cloud space, the company that builds the services might have more control over their infrastructure, such the ability to set policies that make it easier for customers to secure their data and their networks, and to use those policies for data protection purposes.
Private cloud providers might also have more financial incentive to have security measures in place.
“If the security is good, and they’re making money off the public service, they’re more likely to have it,” Dhillons says.
“The biggest takeaway is that there’s a real demand for infrastructure protection,” he said.
“People are looking for more protection and more security and they want to get it.
It’s a big market opportunity for companies.”
The study looks at different types and types of cybersecurity threats, including malware, data theft, phishing, social engineering, and physical threats.
The study looked at data breaches by both public and non-public sector organizations, and looked to understand the impact of different types.
For example, a study found that there were roughly 1.2 billion phishing attempts made on the Internet every month