One year after WannaCry infected over 200,000 computers in 150 countries globally, 40 percent of respondents say their organisation is more exposed than it was a year ago.

The WannaCry ransomware attack that crippled the NHS and infected more than 200,000 computers in 150 countries has not translated into action at many organisations. According to a Tanium survey of 500 frontline IT security workers in the U.K, one third (36 percent) of respondents admitted there was panic immediately after the WannaCry attack, but nothing has changed since.

The findings show that two fifths (40 percent) admit their organisation is more exposed than they were a year ago. Whilst, just 31 percent state their organisation has invested in a new security solution since WannaCry, despite their boards claiming to have placed more importance on IT security since the attack.

Major issues highlighted in the research include:

Critical actions have not been taken

According to the findings, UK firms responded immediately after the attack, reviewing existing security systems (62 percent) and redefining the process for reacting to security incidents (38 percent). However, it seems that immediate concern did not translate into long-term action.

Businesses are still struggling with basic systems management tasks, such as patching, which are critical to preventing future attacks. According to the study, more than sixty percent (66 percent) of respondents admitted that they haven’t improved their patch management process since the WannaCry attack.

For many survey respondents, the need to innovate quickly is causing them to compromise on their security practices. In fact, one in five stated their cyber practices haven’t changed as other IT initiatives had to take priority. Lack of budget was also cited by almost a quarter (23 percent) of respondents as a factor holding them back from implementing the cybersecurity technology and policies.

Matt Ellard, Vice President, EMEA at Tanium, explains:

“It’s genuinely concerning that U.K. organisations claim to have learnt lessons from WannaCry but are struggling to take actions to stop a similar attack from happening again.

 The attack, which grabbed headlines all over the world, should have been a wake-up call for businesses to get their houses in order. However, legacy systems and architecture, fear of patching, fragmentation of point solutions, limited budgets and silos that exist within the IT operations and security teams are still leaving UK firms vulnerable to attack.”

The accountability gap

Almost half (42 percent) of the frontline IT workers surveyed believe their senior leadership team fails to realise how exposed their companies are to cyber threats. Whilst over a quarter (28 percent) say their organisation prioritises client entertainment and employee welfare initiatives such as Christmas parties. In fact, 43 percent say they struggle to get funding for urgent cybersecurity projects. This has led one in 10 to admit they are not confident their organisation could immediately respond to or recover from another WannaCry-style attack.

Ellard concludes:

“We’ve seen countless breaches in the last 12 months and businesses need stronger resilience to fight future threats. Having clear visibility of all of the endpoints across the network and being able to act on this in real-time is crucial to fighting off cyber-attacks and safeguarding future business.

Businesses can no longer afford to overlook the scale of the threats they face and the IT operations and security teams need to bridge the accountability gap to protect the network, company and customer data.”

Post Views: 951