- Rapid adoption of workplace collaboration tools, such as Microsoft Teams, Slack, Google Hangouts and Zoom, which are low effort targets for malicious attackers looking to gain access to enterprise tools.
- Growth of ‘Shadow IT’ i.e. increased use of personal devices, collaboration tools and cloud storage for business purposes.
- Increase in the number of users working in a less-than-secure home environment (security risks can include connected devices and poor network security) as businesses shut their doors and encourage agile and remote working.
- network monitoring and intrusion/breach detection,
- anti-virus monitoring and management,
- firewalls with email and web filtering,
- patch management and system upgrades,
- incident response - investigation and remediation,
- security assessments and audits,
- threat intelligence,
- compliance management, and
- training and consulting advice.
- robust, documented service levels and response times,
- better threat management and mitigation,
- improved reporting and management information,
- access to specialist resources,
- access to best-in-class technology and other leading practices.