Malware, ransomware, and data breaches are on the rise in India, due to advancements in automation and artificial intelligence (AI) across economic sectors. According to the recent Dell Technologies 2021 Global Data Protection Index, 70 percent of the respondents in India believe that emerging technologies such as cloud-native applications, Kubernetes containers, AI, and machine learning pose a risk to data protection, and the lack of data protection solutions for newer technologies is one of the top three data protection challenges for organizations.
Ripu Bajwa, director and general manager, Dell Technologies, Data Protection Solutions, India, identifies three trends that will shape the cybersecurity and data protection landscape. The three trends are increase in cloud services and corresponding data protection threats, increased awareness around industry initiatives such as security orchestration, automation and response, and the need for Unified Visibility and Control.
According to the International Data Corporation (IDC), with today’s hybrid workforce, up to 70 percent of all breaches still originate on the endpoint, IT teams must improve both their visibility and their capacity to regulate remotely. As a result, in 2022, businesses will increasingly seek unified and proactive security solutions to protect their landscape of technology assets, including legacy endpoints, mobile devices, and cloud workloads, without overburdening employees and in-house management resources.
Dell said that in the new year, Indian CIOs and risk management leaders should explore the security and productivity benefits of an XDR (Extended, Detection, and Response) solution.
Dell stated “In 2022, organizations must continue to invest in compliance and data sovereignty. More companies must level up with the requirements of GDPR, which especially expects organizations to integrate the latest encryption technologies to safeguard consumers’ data and to minimize the hazards associated with data transfers,”
Looking ahead, Dell believes the industry has progressed to the point where it is aware of developing and rising security concerns, but the key is to eliminate the bias towards actioning against the same. Every attack surface requires proactive evaluation, monitoring, and counter-attack.