![]() |
½ÃÀ庸°í¼
»óǰÄÚµå
1367802
¿£ÅÍÇÁ¶óÀÌÁî »çÀ̹ö º¸¾ÈÀÇ ÁÖ¿ä ´ÜÁ¡(2023³â)Top Enterprise Cybersecurity Shortcomings, 2023 |
ÀÌ IDC °üÁ¡¿¡¼´Â ¿À´Ã³¯ ºÏ¹Ì ±â¾÷ÀÇ »çÀ̹ö º¸¾È °üÇàÀ» Á¤ÀÇÇÏ´Â ÁÖ¿ä Æ®·»µå¿¡ ÃÊÁ¡À» ¸ÂÃß°í ÀÖ½À´Ï´Ù. ¸¹Àº ±â¾÷µéÀÌ »çÀ̹ö º¸¾È Àü·«¿¡¼ Å« °ÝÂ÷¿¡ °è¼Ó Á÷¸éÇϰí ÀÖ½À´Ï´Ù. ÀÏ¹Ý ±â¾÷µéÀº ±¤¹üÀ§ÇÑ »çÀ̹ö º¸¾È µµ±¸¿Í Àü·«¿¡ ÅõÀÚÇϰí ÀÖÁö¸¸, ¿ø°Ý ¿£µåÆ÷ÀÎÆ® º¸¾È, ID ¹× ¾×¼¼½º °ü¸® Á¦¾î, ¿ëµµ ¹× ¼ÒÇÁÆ®¿þ¾î °ø±Þ¸Á º¸¾È, º¹±¸ ¹× ´ëÀÀ, GRC µîÀÇ ºÐ¾ß¿¡¼´Â ¿©ÀüÈ÷ ¸¹Àº ±â¾÷µéÀÌ ºÎÁ·ÇÕ´Ï´Ù. ÁÁÀº ¼Ò½ÄÀº ÀÌ·¯ÇÑ °ÝÂ÷¸¦ ÇØ¼ÒÇÒ ¼ö ÀÖ´Â ¼Ö·ç¼ÇÀÌ Á¸ÀçÇϸç, ´ëºÎºÐÀÇ Á¶Á÷ÀÌ ½±°Ô Á¢±ÙÇÒ ¼ö ÀÖ´Ù´Â °ÍÀÔ´Ï´Ù. IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) ºñ»ó±Ù ¿¬±¸ °í¹®ÀÎ Å©¸®½º ÅäÄ¡(Chris Tozzi)´Â "»çÀ̹ö º¸¾ÈÀ» °ÈÇϱâ À§Çؼ´Â Á¶Á÷¿¡ ÇÊ¿äÇÑ Ãß°¡ µµ±¸¿Í °üÇàÀ» ½Äº°Çϰí À̸¦ µµÀÔÇÏ´Â °ÍÀÌ Áß¿äÇÏ´Ù"°í ¸»Çß½À´Ï´Ù. "±â¾÷ÀÌ »çÀ̹ö º¸¾ÈÀ» ½É°¢ÇÏ°Ô ¹Þ¾ÆµéÀ̰í ÀÖ´Â °ÍÀº ºÐ¸íÇÏÁö¸¸, Á÷¸éÇÑ À§ÇùÀÌ ´Ù¾çÇϱ⠶§¹®¿¡ ¸ðµç À¯ÇüÀÇ À§Çù°ú À§Çè °ü¸®¿¡ ¹Ýµå½Ã ¼º°øÇÏ´Â °ÍÀº ¾Æ´Ï´Ù"¶ó¸ç, "CISO¿Í CIO´Â »çÀ̹ö º¸¾È Àü·«ÀÇ °ÝÂ÷¸¦ Æò°¡Çϰí À§Çù ÇàÀ§ÀÚ°¡ ħÀÔÇϱâ Àü¿¡ °ÝÂ÷¸¦ ÇØ¼ÒÇØ¾ß ÇÑ´Ù"°í ¸»Çß½À´Ï´Ù. ÇàÀ§ÀÚ°¡ ħÀÔÇϱâ Àü¿¡ ±× °ÝÂ÷¸¦ ¸Þ¿ö¾ß ÇÑ´Ù"°í °Á¶Çß½À´Ï´Ù.
This IDC Perspective highlights key trends that define cybersecurity practices at North American enterprises today. Many enterprises continue to face major gaps within their cybersecurity strategies. Although the typical organization has invested in a broad range of cybersecurity tools and strategies, a significant number of enterprises continue to fall short in areas such as remote endpoint security, identity and access management controls, application and software supply chain security, remediation and response, and GRC. The good news is that solutions to close these gaps are available and, in many cases, within easy reach for most organizations. Therefore, enhancing cybersecurity is a matter of identifying which additional tools and practices your organization needs and then adopting them."Enterprises clearly take cybersecurity seriously, but given the wide array of threats they face, they are not always successful in managing all types of threats and risks," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "CISOs and CIOs must take stock of the gaps within their cybersecurity strategies, then close them before threat actors break through."