Featured Article

5 questions every IT team should be able to answer

When the CEO comes calling, are you prepared?

Comment

Directly Above Shot Of Question Marks On Colorful Papers On Table
Image Credits: Mohd Hafiez Mohd Razali/EyeEm (opens in a new window)

Christy Wyatt

Contributor

Christy Wyatt is Chief Executive Officer and a member of the board of directors at Absolute, a leader in endpoint resilience solutions and the industry’s only undeletable defense platform embedded in over a half-billion devices.

Now more than ever, IT teams play a vital role in keeping their businesses running smoothly and securely. With all of the assets and data that are now broadly distributed, a CEO depends on their IT team to ensure employees remain connected and productive and that sensitive data remains protected.

CEOs often visualize and measure things in terms of dollars and cents, and in the face of continuing uncertainty, IT — along with most other parts of the business — is facing intense scrutiny and tightening of budgets. So, it is more important than ever to be able to demonstrate that they’ve made sound technology investments and have the agility needed to operate successfully in the face of continued uncertainty.

Here are five questions that IT teams should be ready to answer when their CEO comes calling:

What have we spent our money on?

Or, more specifically, exactly how many assets do we have? And, do we know where they are? While these seem like basic questions, they can be shockingly difficult to answer … much more difficult than people realize. The last several months in the wake of the COVID-19 outbreak have been the proof point.

With the mass exodus of machines leaving the building and disconnecting from the corporate network, many IT leaders found themselves guessing just how many devices had been released into the wild and gone home with employees.

One CIO we spoke to estimated they had “somewhere between 30,000 and 50,000 devices” that went home with employees, meaning there could have been up to 20,000 that were completely unaccounted for. The complexity was further compounded as old devices were pulled out of desk drawers and storage closets to get something into the hands of employees who were not equipped to work remotely. Companies had endpoints connecting to corporate network and systems that they hadn’t seen for years — meaning they were out-of-date from a security perspective as well.

This level of uncertainty is obviously unsustainable and introduces a tremendous amount of security risk. Every endpoint that goes unaccounted for not only means wasted spend but also increased vulnerability, greater potential for breach or compliance violation, and more. In order to mitigate these risks, there needs to be a permanent connection to every device that can tell you exactly how many assets you have deployed at any given time — whether they are in the building or out in the wild.

Are our devices and data protected?

Device and data security go hand in hand; without the ability to see every device that is deployed across an organization, it becomes next to impossible to know what data is living on those devices. When employees know they are leaving the building and going to be off network, they tend to engage in “data hoarding.”

Storing it locally ensures they’ll have access to it later if they run into issues connecting to corporate systems remotely. Our recent analysis showed the number of pieces of sensitive data identified on enterprise endpoints at the end of October — such as personally identifiable information (PII), personal health information (PHI) and more — was up more than 100% versus pre-COVID-19. This is particularly alarming as this data is being stored on devices in varying states of security compliance and often on home networks.

What this ultimately translates to is a potentially massive attack surface, one that is incapable of being secured without the right tools in place. In order for a CEO to properly understand risk exposure and make the right investments to mitigate the most substantial of those risks, IT departments have to be able to confidently communicate what types of data are on any given device at any given time.

Are we working efficiently?

As employees were quickly sent home to work remotely, already-stretched IT teams have carried a lion’s share of the burden of not only standing up remote work programs, but also ensuring they continue to run smoothly and securely. Not every IT tool was ready to make the sudden transition.

One example we saw was VPNs — in many cases deployed to support a few mobile workers, not the entire company. With devices in various states of disarray, and many users struggling with connectivity from home, the bandwidth required from the platform and the help desk supporting it had some organizations instructing employees not to use their VPNs.

Not only does this affect employees’ ability to work productively, it also hinders IT’s ability to ensure basic, foundational security measures are in place. There’s data to show that even pre-pandemic, the struggle to promptly and effectively patch critical vulnerabilities, as well as keep vital security applications like encryption and AV up-to-date and working correctly, is real … but these challenges multiplied exponentially with the transition to remote work.

Automation is going to play an important role when it comes to operating successfully and sustainably in this new reality. Things like custom workflows can help IT teams ensure critical updates are successfully installed even when devices are off network or that devices are disconnected from systems or servers until those updates are applied. Self-healing apps and devices can repair and restore themselves when they fall down or are tampered with, saving both the end user and IT from having yet one more ticket added to the backlog.

Are we investing enough or too much?

Fundamentally, your CEO wants to know whether the level of investment and execution matches the risk appetite of the organization. “Where am I vulnerable and have I purchased technology that can protect me?” is the leading question CEOs and their boards put to their IT and security teams.

Security is a rapidly evolving risk landscape where IT organizations are constantly in acquisition mode. Enterprises today have purchased an average of 75 security products, though go to larger or regulated organizations and the numbers will be even higher. Gartner predicts that enterprise security spend will reach $178 billion annually by 2024 and we estimate that a large portion of that will be spent on endpoint security — securing devices.

On average, a device in the enterprise today has 10 security applications on it, and that number continues to increase every year. Many frameworks, such as NIST or ISO, have emerged that quantify and map risk, allowing organizations to plan a course for prevention, remediation and readiness.

Is it working?

Honestly, I wish more CEOs were asking this question.

Many organizations today have a false sense of security. Despite the staggering annual spend numbers, we have not seen a correlated decrease in endpoint incidents. The exercise of “we bought XYZ solution because the framework told us we needed it” allows everyone to “tick” the box and move on. Unfortunately, installing these applications does not ensure they remain installed and working.

As any IT practitioner will tell you, there’s a tremendous amount of time and money spent chasing this rainbow. Users tamper with controls, updates fail to install correctly, and applications collide or decay over time.

As total spend and number of security applications have continued to rise, so too has the complexity in making it all work. There are significant security implications of knowing whether a device’s software and applications are completely up-to-date, patched and sanctioned. Data shows that 60% of data breaches last year were the result of a known vulnerability where a patch had not been applied — something that IT was already tracking and had a fix available.

With no way to monitor endpoint health, unfavorable odds point to machines having hundreds of vulnerabilities that could be mitigated by something as simple as a software patch.

IT must have a way to measure the efficacy of existing controls and demonstrate that they are actually working properly in order to show accountability for actually remediating risk.

There also needs to be full acknowledgment that it’s not a question of if the organization will be attacked or compromised, but when … and when hundreds or thousands of devices are walking out the door, that risk increases exponentially. CEOs need to know if those devices have an encryption agent installed and working effectively, if devices can be frozen or wiped remotely, and how data can be recovered safely from a compromised machine or remotely deleted forever.

One thing a lot of IT departments overlook is the need for a feedback loop — the ability to monitor the actual efficacy of the security investments being made. To ensure that you have a permanent connection to every asset in the organization that cannot be taken offline or tampered with, and through that connection you can not only see and manage that device, but also automate the healing of critical controls, can be an incredibly powerful tool in this modern enterprise computing mode.

Managing and securing endpoints is a complex challenge to navigate in any scenario, but when the stakes are raised, CEOs need answers to these basic questions in order to understand where there may be gaps or vulnerabilities and then make smart, targeted investments.

Especially at a time when so many have transitioned to remote work, IT teams play a crucial role in a company’s survivability and performing that role best — especially in the eyes of their CEO — includes answering these five questions as thoroughly as possible.

3 questions to ask before adopting microservice architecture

More TechCrunch

Welcome back to TechCrunch’s Week in Review — TechCrunch’s newsletter recapping the week’s biggest news. Want it in your inbox every Saturday? Sign up here. Over the past eight years,…

Fisker collapsed under the weight of its founder’s promises

What is AI? We’ve put together this non-technical guide to give anyone a fighting chance to understand how and why today’s AI works.

WTF is AI?

President Joe Biden has vetoed H.J.Res. 109, a congressional resolution that would have overturned the Securities and Exchange Commission’s current approach to banks and crypto. Specifically, the resolution targeted the…

President Biden vetoes crypto custody bill

Featured Article

Industries may be ready for humanoid robots, but are the robots ready for them?

How large a role humanoids will play in that ecosystem is, perhaps, the biggest question on everyone’s mind at the moment.

12 hours ago
Industries may be ready for humanoid robots, but are the robots ready for them?

VCs are clamoring to invest in hot AI companies, willing to pay exorbitant share prices for coveted spots on their cap tables. Even so, most aren’t able to get into…

VCs are selling shares of hot AI companies like Anthropic and xAI to small investors in a wild SPV market

The fashion industry has a huge problem: Despite many returned items being unworn or undamaged, a lot, if not the majority, end up in the trash. An estimated 9.5 billion…

Deal Dive: How (Re)vive grew 10x last year by helping retailers recycle and sell returned items

Tumblr officially shut down “Tips,” an opt-in feature where creators could receive one-time payments from their followers.  As of today, the tipping icon has automatically disappeared from all posts and…

You can no longer use Tumblr’s tipping feature 

Generative AI improvements are increasingly being made through data curation and collection — not architectural — improvements. Big Tech has an advantage.

AI training data has a price tag that only Big Tech can afford

Keeping up with an industry as fast-moving as AI is a tall order. So until an AI can do it for you, here’s a handy roundup of recent stories in the world…

This Week in AI: Can we (and could we ever) trust OpenAI?

Jasper Health, a cancer care platform startup, laid off a substantial part of its workforce, TechCrunch has learned.

General Catalyst-backed Jasper Health lays off staff

Featured Article

Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach

Live Nation says its Ticketmaster subsidiary was hacked. A hacker claims to be selling 560 million customer records.

1 day ago
Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach

Featured Article

Inside EV startup Fisker’s collapse: how the company crumbled under its founders’ whims

An autonomous pod. A solid-state battery-powered sports car. An electric pickup truck. A convertible grand tourer EV with up to 600 miles of range. A “fully connected mobility device” for young urban innovators to be built by Foxconn and priced under $30,000. The next Popemobile. Over the past eight years, famed vehicle designer Henrik Fisker…

1 day ago
Inside EV startup Fisker’s collapse: how the company crumbled under its founders’ whims

Late Friday afternoon, a time window companies usually reserve for unflattering disclosures, AI startup Hugging Face said that its security team earlier this week detected “unauthorized access” to Spaces, Hugging…

Hugging Face says it detected ‘unauthorized access’ to its AI model hosting platform

Featured Article

Hacked, leaked, exposed: Why you should never use stalkerware apps

Using stalkerware is creepy, unethical, potentially illegal, and puts your data and that of your loved ones in danger.

1 day ago
Hacked, leaked, exposed: Why you should never use stalkerware apps

The design brief was simple: each grind and dry cycle had to be completed before breakfast. Here’s how Mill made it happen.

Mill’s redesigned food waste bin really is faster and quieter than before

Google is embarrassed about its AI Overviews, too. After a deluge of dunks and memes over the past week, which cracked on the poor quality and outright misinformation that arose…

Google admits its AI Overviews need work, but we’re all helping it beta test

Welcome to Startups Weekly — Haje‘s weekly recap of everything you can’t miss from the world of startups. Sign up here to get it in your inbox every Friday. In…

Startups Weekly: Musk raises $6B for AI and the fintech dominoes are falling

The product, which ZeroMark calls a “fire control system,” has two components: a small computer that has sensors, like lidar and electro-optical, and a motorized buttstock.

a16z-backed ZeroMark wants to give soldiers guns that don’t miss against drones

The RAW Dating App aims to shake up the dating scheme by shedding the fake, TikTok-ified, heavily filtered photos and replacing them with a more genuine, unvarnished experience. The app…

Pitch Deck Teardown: RAW Dating App’s $3M angel deck

Yes, we’re calling it “ThreadsDeck” now. At least that’s the tag many are using to describe the new user interface for Instagram’s X competitor, Threads, which resembles the column-based format…

‘ThreadsDeck’ arrived just in time for the Trump verdict

Japanese crypto exchange DMM Bitcoin confirmed on Friday that it had been the victim of a hack resulting in the theft of 4,502.9 bitcoin, or about $305 million.  According to…

Hackers steal $305M from DMM Bitcoin crypto exchange

This is not a drill! Today marks the final day to secure your early-bird tickets for TechCrunch Disrupt 2024 at a significantly reduced rate. At midnight tonight, May 31, ticket…

Disrupt 2024 early-bird prices end at midnight

Instagram is testing a way for creators to experiment with reels without committing to having them displayed on their profiles, giving the social network a possible edge over TikTok and…

Instagram tests ‘trial reels’ that don’t display to a creator’s followers

U.S. federal regulators have requested more information from Zoox, Amazon’s self-driving unit, as part of an investigation into rear-end crash risks posed by unexpected braking. The National Highway Traffic Safety…

Feds tell Zoox to send more info about autonomous vehicles suddenly braking

You thought the hottest rap battle of the summer was between Kendrick Lamar and Drake. You were wrong. It’s between Canva and an enterprise CIO. At its Canva Create event…

Canva’s rap battle is part of a long legacy of Silicon Valley cringe

Voice cloning startup ElevenLabs introduced a new tool for users to generate sound effects through prompts today after announcing the project back in February.

ElevenLabs debuts AI-powered tool to generate sound effects

We caught up with Antler founder and CEO Magnus Grimeland about the startup scene in Asia, the current tech startup trends in the region and investment approaches during the rise…

VC firm Antler’s CEO says Asia presents ‘biggest opportunity’ in the world for growth

Temu is to face Europe’s strictest rules after being designated as a “very large online platform” under the Digital Services Act (DSA).

Chinese e-commerce marketplace Temu faces stricter EU rules as a ‘very large online platform’

Meta has been banned from launching features on Facebook and Instagram that would have collected data on voters in Spain using the social networks ahead of next month’s European Elections.…

Spain bans Meta from launching election features on Facebook, Instagram over privacy fears

Stripe, the world’s most valuable fintech startup, said on Friday that it will temporarily move to an invite-only model for new account sign-ups in India, calling the move “a tough…

Stripe curbs its India ambitions over regulatory situation