Featured Article

5 questions every IT team should be able to answer

When the CEO comes calling, are you prepared?

Comment

Directly Above Shot Of Question Marks On Colorful Papers On Table
Image Credits: Mohd Hafiez Mohd Razali/EyeEm (opens in a new window)

Christy Wyatt

Contributor

Christy Wyatt is Chief Executive Officer and a member of the board of directors at Absolute, a leader in endpoint resilience solutions and the industry’s only undeletable defense platform embedded in over a half-billion devices.

Now more than ever, IT teams play a vital role in keeping their businesses running smoothly and securely. With all of the assets and data that are now broadly distributed, a CEO depends on their IT team to ensure employees remain connected and productive and that sensitive data remains protected.

CEOs often visualize and measure things in terms of dollars and cents, and in the face of continuing uncertainty, IT — along with most other parts of the business — is facing intense scrutiny and tightening of budgets. So, it is more important than ever to be able to demonstrate that they’ve made sound technology investments and have the agility needed to operate successfully in the face of continued uncertainty.

Here are five questions that IT teams should be ready to answer when their CEO comes calling:

What have we spent our money on?

Or, more specifically, exactly how many assets do we have? And, do we know where they are? While these seem like basic questions, they can be shockingly difficult to answer … much more difficult than people realize. The last several months in the wake of the COVID-19 outbreak have been the proof point.

With the mass exodus of machines leaving the building and disconnecting from the corporate network, many IT leaders found themselves guessing just how many devices had been released into the wild and gone home with employees.

One CIO we spoke to estimated they had “somewhere between 30,000 and 50,000 devices” that went home with employees, meaning there could have been up to 20,000 that were completely unaccounted for. The complexity was further compounded as old devices were pulled out of desk drawers and storage closets to get something into the hands of employees who were not equipped to work remotely. Companies had endpoints connecting to corporate network and systems that they hadn’t seen for years — meaning they were out-of-date from a security perspective as well.

This level of uncertainty is obviously unsustainable and introduces a tremendous amount of security risk. Every endpoint that goes unaccounted for not only means wasted spend but also increased vulnerability, greater potential for breach or compliance violation, and more. In order to mitigate these risks, there needs to be a permanent connection to every device that can tell you exactly how many assets you have deployed at any given time — whether they are in the building or out in the wild.

Are our devices and data protected?

Device and data security go hand in hand; without the ability to see every device that is deployed across an organization, it becomes next to impossible to know what data is living on those devices. When employees know they are leaving the building and going to be off network, they tend to engage in “data hoarding.”

Storing it locally ensures they’ll have access to it later if they run into issues connecting to corporate systems remotely. Our recent analysis showed the number of pieces of sensitive data identified on enterprise endpoints at the end of October — such as personally identifiable information (PII), personal health information (PHI) and more — was up more than 100% versus pre-COVID-19. This is particularly alarming as this data is being stored on devices in varying states of security compliance and often on home networks.

What this ultimately translates to is a potentially massive attack surface, one that is incapable of being secured without the right tools in place. In order for a CEO to properly understand risk exposure and make the right investments to mitigate the most substantial of those risks, IT departments have to be able to confidently communicate what types of data are on any given device at any given time.

Are we working efficiently?

As employees were quickly sent home to work remotely, already-stretched IT teams have carried a lion’s share of the burden of not only standing up remote work programs, but also ensuring they continue to run smoothly and securely. Not every IT tool was ready to make the sudden transition.

One example we saw was VPNs — in many cases deployed to support a few mobile workers, not the entire company. With devices in various states of disarray, and many users struggling with connectivity from home, the bandwidth required from the platform and the help desk supporting it had some organizations instructing employees not to use their VPNs.

Not only does this affect employees’ ability to work productively, it also hinders IT’s ability to ensure basic, foundational security measures are in place. There’s data to show that even pre-pandemic, the struggle to promptly and effectively patch critical vulnerabilities, as well as keep vital security applications like encryption and AV up-to-date and working correctly, is real … but these challenges multiplied exponentially with the transition to remote work.

Automation is going to play an important role when it comes to operating successfully and sustainably in this new reality. Things like custom workflows can help IT teams ensure critical updates are successfully installed even when devices are off network or that devices are disconnected from systems or servers until those updates are applied. Self-healing apps and devices can repair and restore themselves when they fall down or are tampered with, saving both the end user and IT from having yet one more ticket added to the backlog.

Are we investing enough or too much?

Fundamentally, your CEO wants to know whether the level of investment and execution matches the risk appetite of the organization. “Where am I vulnerable and have I purchased technology that can protect me?” is the leading question CEOs and their boards put to their IT and security teams.

Security is a rapidly evolving risk landscape where IT organizations are constantly in acquisition mode. Enterprises today have purchased an average of 75 security products, though go to larger or regulated organizations and the numbers will be even higher. Gartner predicts that enterprise security spend will reach $178 billion annually by 2024 and we estimate that a large portion of that will be spent on endpoint security — securing devices.

On average, a device in the enterprise today has 10 security applications on it, and that number continues to increase every year. Many frameworks, such as NIST or ISO, have emerged that quantify and map risk, allowing organizations to plan a course for prevention, remediation and readiness.

Is it working?

Honestly, I wish more CEOs were asking this question.

Many organizations today have a false sense of security. Despite the staggering annual spend numbers, we have not seen a correlated decrease in endpoint incidents. The exercise of “we bought XYZ solution because the framework told us we needed it” allows everyone to “tick” the box and move on. Unfortunately, installing these applications does not ensure they remain installed and working.

As any IT practitioner will tell you, there’s a tremendous amount of time and money spent chasing this rainbow. Users tamper with controls, updates fail to install correctly, and applications collide or decay over time.

As total spend and number of security applications have continued to rise, so too has the complexity in making it all work. There are significant security implications of knowing whether a device’s software and applications are completely up-to-date, patched and sanctioned. Data shows that 60% of data breaches last year were the result of a known vulnerability where a patch had not been applied — something that IT was already tracking and had a fix available.

With no way to monitor endpoint health, unfavorable odds point to machines having hundreds of vulnerabilities that could be mitigated by something as simple as a software patch.

IT must have a way to measure the efficacy of existing controls and demonstrate that they are actually working properly in order to show accountability for actually remediating risk.

There also needs to be full acknowledgment that it’s not a question of if the organization will be attacked or compromised, but when … and when hundreds or thousands of devices are walking out the door, that risk increases exponentially. CEOs need to know if those devices have an encryption agent installed and working effectively, if devices can be frozen or wiped remotely, and how data can be recovered safely from a compromised machine or remotely deleted forever.

One thing a lot of IT departments overlook is the need for a feedback loop — the ability to monitor the actual efficacy of the security investments being made. To ensure that you have a permanent connection to every asset in the organization that cannot be taken offline or tampered with, and through that connection you can not only see and manage that device, but also automate the healing of critical controls, can be an incredibly powerful tool in this modern enterprise computing mode.

Managing and securing endpoints is a complex challenge to navigate in any scenario, but when the stakes are raised, CEOs need answers to these basic questions in order to understand where there may be gaps or vulnerabilities and then make smart, targeted investments.

Especially at a time when so many have transitioned to remote work, IT teams play a crucial role in a company’s survivability and performing that role best — especially in the eyes of their CEO — includes answering these five questions as thoroughly as possible.

3 questions to ask before adopting microservice architecture

More TechCrunch

Silo, a Bay Area food supply chain startup, has hit a rough patch. TechCrunch has learned that the company on Tuesday laid off roughly 30% of its staff, or north…

Food supply chain software maker Silo lays off ~30% of staff amid M&A discussions

Featured Article

Meta’s new AI council is composed entirely of white men

Meanwhile, women and people of color are disproportionately impacted by irresponsible AI.

7 hours ago
Meta’s new AI council is composed entirely of white men

If you’ve ever wanted to apply to Y Combinator, here’s some inside scoop on how the iconic accelerator goes about choosing companies.

Garry Tan has revealed his ‘secret sauce’ for getting into Y Combinator

Indian ride-hailing startup BluSmart has started operating in Dubai, TechCrunch has exclusively learned and confirmed with its executive. The move to Dubai, which has been rumored for months, could help…

India’s BluSmart is testing its ride-hailing service in Dubai

Under the envisioned framework, both candidate and issue ads would be required to include an on-air and filed disclosure that AI-generated content was used.

FCC proposes all AI-generated content in political ads must be disclosed

Want to make a founder’s day, week, month, and possibly career? Refer them to Startup Battlefield 200 at Disrupt 2024! Applications close June 10 at 11:59 p.m. PT. TechCrunch’s Startup…

Refer a founder to Startup Battlefield 200 at Disrupt 2024

Social networking startup and X competitor Bluesky is officially launching DMs (direct messages), the company announced on Wednesday. Later, Bluesky plans to “fully support end-to-end encrypted messaging down the line,”…

Bluesky now has DMs

The perception in Silicon Valley is that every investor would love to be in business with Peter Thiel. But the venture capital fundraising environment has become so difficult that even…

Peter Thiel-founded Valar Ventures raised a $300 million fund, half the size of its last one

Featured Article

Spyware found on US hotel check-in computers

Several hotel check-in computers are running a remote access app, which is leaking screenshots of guest information to the internet.

11 hours ago
Spyware found on US hotel check-in computers

Gavet has had a rocky tenure at Techstars and her leadership was the subject of much controversy.

Techstars CEO Maëlle Gavet is out

The struggle isn’t universal, however.

Connected fitness is adrift post-pandemic

Featured Article

A comprehensive list of 2024 tech layoffs

The tech layoff wave is still going strong in 2024. Following significant workforce reductions in 2022 and 2023, this year has already seen 60,000 job cuts across 254 companies, according to independent layoffs tracker Layoffs.fyi. Companies like Tesla, Amazon, Google, TikTok, Snap and Microsoft have conducted sizable layoffs in the first months of 2024. Smaller-sized…

12 hours ago
A comprehensive list of 2024 tech layoffs

HoundDog actually looks at the code a developer is writing, using both traditional pattern matching and large language models to find potential issues.

HoundDog.ai helps developers prevent personal information from leaking

The changes are designed to enhance the consumer experience of using Google Pay and make it a more competitive option against other payment methods.

Google Pay will now display card perks, BNPL options and more

Few figures in the tech industry have earned the storied reputation of Vinod Khosla, founder and partner at Khosla Ventures. For over 40 years, he has been at the center…

Vinod Khosla is coming to Disrupt to discuss how AI might change the future

AI has already started replacing voice agents’ jobs. Now, companies are exploring ways to replace the existing computer-generated voice models with synthetic versions of human voices. Truecaller, the widely known…

Truecaller partners with Microsoft to let its AI respond to calls in your own voice

Meta is updating its Ray-Ban smart glasses with new hands-free functionality, the company announced on Wednesday. Most notably, users can now share an image from their smart glasses directly to…

Meta’s Ray-Ban smart glasses now let you share images directly to your Instagram Story

Spotify launched its own font, the company announced on Wednesday. The music streaming service hopes that its new typeface, “Spotify Mix,” will help Spotify distinguish its own unique visual identity. …

Why Spotify is launching its own font, Spotify Mix

In 2008, Marty Kagan, who’d previously worked at Cisco and Akamai, co-founded Cedexis, a (now-Cisco-owned) firm developing observability tech for content delivery networks. Fellow Cisco veteran Hasan Alayli joined Kagan…

Hydrolix seeks to make storing log data faster and cheaper

A dodgy email containing a link that looks “legit” but is actually malicious remains one of the most dangerous, yet successful, tricks in a cybercriminal’s handbook. Now, an AI startup…

Bolster, creator of the CheckPhish phishing tracker, raises $14M led by Microsoft’s M12

If you’ve been looking forward to seeing Boeing’s Starliner capsule carry two astronauts to the International Space Station for the first time, you’ll have to wait a bit longer. The…

Boeing, NASA indefinitely delay crewed Starliner launch

TikTok is the latest tech company to incorporate generative AI into its ads business, as the company announced on Tuesday that it’s launching a new “TikTok Symphony” AI suite for…

TikTok turns to generative AI to boost its ads business

Gone are the days when space and defense were considered fundamentally antithetical to venture investment. Now, the country’s largest venture capital firms are throwing larger portions of their money behind…

Space VC closes $20M Fund II to back frontier tech founders from day zero

These days every company is trying to figure out if their large language models are compliant with whichever rules they deem important, and with legal or regulatory requirements. If you’re…

Patronus AI is off to a magical start as LLM governance tool gains traction

Link-in-bio startup Linktree has crossed 50 million users and is rolling out the beta of its social commerce program.

Linktree surpasses 50M users, rolls out its social commerce program to more creators

For a $5.99 per month, immigrants have a bank account and debit card with fee-free international money transfers and discounted international calling.

Immigrant banking platform Majority secures $20M following 3x revenue growth

When developers have a particular job that AI can solve, it’s not typically as simple as just pointing an LLM at the data. There are other considerations such as cost,…

Unify helps developers find the best LLM for the job

Response time is Aerodome’s immediate value prop for potential clients.

Aerodome is sending drones to the scene of the crime

Granola takes a more collaborative approach to working with AI.

Granola debuts an AI notepad for meetings