Endpoint security versus productivity in utilities: a false choice?
Utility companies are often targeted because they can be used so effectively as phishing lures, as they hold sensitive information about millions of customers, including financial and contact data.
Utilities companies are busy implementing strategies to derive insight from and monetise the data that all these devices provide. But their attack surface is growing steadily – and the interconnected reality of utility provision means that if an attack on one endpoint lands, all are vulnerable.
The results shown in this research paper are drawn from a survey covering 100 IT professionals with responsibility for security strategy or implementation in utilities organisations.
Download now to learn why the utilities sector does not have to choose between the securing of endpoints and the productivity of users – and security teams.
Read More
By submitting this form you agree to BlackBerry contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. BlackBerry web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Applications, Cloud, Collaboration, Email, Embedded Systems, Endpoint Security, ERP, Hardware, Malware, Network, SAN


More resources from BlackBerry

BlackBerry Cyber Suite: Bridging the Gap Betw...
The challenge of securing and protecting data and endpoints is not a new requirement, but today it is more important than ever. With a rapidly expa...

BlackBerry Guard: Solution Brief
Many businesses overlook or underinvest in managed detection and response (MDR), a critical aspect of effective cybersecurity. Organizations that d...

CISO strategies for proactive threat preventi...
Security leaders are under immense pressure to protect their organizations from cyberattacks. But the evolving threat landscape, and increasing sop...