71% of CIO’s regularly blindsided by unknown devices

CIO’s are regularly ambushed by endpoints they are not aware of, according to new research, with 71 percent of CIOs finding computing devices they weren’t aware of on a daily or weekly basis.
An astonishing 93 percent of IT decision-makers discovered endpoints within their IT environment that they were previously unaware of, in spite of spending millions on data protection alone. Indeed, UK firms have spent an average £51 million on compliance and increased their cyber- liability insurance by an average of £112.9 million each in the last 12 months.
Despite of this significant investment in compliance and risk management, more than nine in 10 (93 percent) of UK businesses have fundamental weaknesses in their IT estate that are leaving them vulnerable, according to the research by Tanium. The research also found that UK businesses are operating highly complex security environments, with an average of 41 separate security and operations tools implemented, a challenge further exacerbated in 35 percent of cases by legacy systems that do not provide accurate information.
Chris Hodson, chief information security officer at Tanium told SC Media UK that blind investment is not the key to success: "Despite huge investment, IT organisations still struggle daily with how best to manage and secure the enterprise environment. Technology leaders must regain control of their IT environment to minimise risk. They should do this not by purchasing more tools, but by focusing on fundamentals. This focus must start at the endpoint: the primary attack vector and failure point."
According to the research, IT leaders are deeply concerned about endpoint visibility, with 57 percent concerned that limited visibility of endpoints will leave their company more vulnerable to cyber-attacks, and 36 percent admitting that the limited visibility is the biggest compliance barrier they face. Meanwhile, 42 percent believe a lack of endpoint visibility will cause brand damage, and also could lead to non-compliance fines (34 percent). Interestingly, despite of this, 94 percent of respondents’ were confident their business could report all necessary breach information to regulators within 72 hours of a real world data breach - a confidence that was undermined by the rest of the survey responses.
The Tanium study spoke to 750 Global IT decision-makers, including 100 respondents from the UK, as well as respondents from the United States, Australia, France, Germany, The Netherlands, Japan, and Canada.

Latest Jobs
-
- 6 month contract Operational Cyber Security - SIEM, Vulnerability, Cyber Essentials + London, Inside IR35
- City of London
- Depending on experience
-
6 month contract inside IR35 Operational Cyber Security London c50% of the role is day to day operations / administration / liaising with 3rd party monitoring suppliers. More though investigations, getting ready for cyber essentials plus. Following up on vulnerability management. 20-30% active monitoring of alerts, tooling etc. 10% reporting / light oversight of junior Experience with Microsoft defender / Azure, Splunk, Tenable Experience in maintaining Cyber Essentials Plus is a big bonus. Knowledge across ISO27001, NIST GDPR required. Inside ir35 need someone in their London (city) office 2-3 days a week.
-
- CONTRACT Fluent French AND English Cyber Security Project manager - 12 month
- United Kingdom
- Dependent on experience
-
Fluent French / English Contactor cyber Security Project Manager needed. Experience in migrating technical cyber services from one physical region to another. Experience with Crowdstrike, Tanium, Palo Alto and or Zscaler ideal or comparable solutions. Language fluency in French AND English is essential. 12 month contract. Looking to start June. Day rate dependent on Experience. Apply today for more details
-
- GRC Security Contractor - Achieve SOC2 Type 1 Compliance - 6 month
- London
- Dependent on experience
-
GRC security practitioner needed to ensure a financial service business to achieve SOC 2 type 1. Experience managing the end to end process is key, you will be the key individual to deliver this within a 6 month deadline. Experience of SOC 2 type 1 / type 2. The gathering of evidence, baseline of 27001, ukdpa, GDPR NIST etc. Looking to interview ASAP.
-
- Contact 12 month- Security Operations- Crowdstrike Falcon Insight EDR / Analyst.
- United Kingdom
- Dependent on experience
-
Security Operations engineer / Analyst with Crowdstrike Falcon Insight EDR experience for a 12 month contract. Experienced Contractor with Crowdstrike Falcon Insight: Endpoint detection and Response (EDR) experience needed - 12 month rolling project. Implementation, configuration and Analyst experience needed with Crowdstrike Falcon Insight: (EDR) Migration project- relocating capability internationally. technically implementing, configuration of that that migration and then transition to BAU role monitoring. DCL Search exclusive associate Project.