Jetzt Ausprobieren
Press

Lansweeper answers the questions raised at the White House Cyber Summit

6 min. read
03/09/2021
By Frederik Jassogne
Cybersecurity Lansweeper Biden scaled 1

The Biden administration might have called on high profile figures to improve cybersecurity – but the reality is it’s down to all businesses to tighten up their IT security measures

GREMBERGEN, BELGIUMLansweeper CEO, Dave Goossens, is today responding to the news that the White House held a Cyber Summit with high profile leaders of some of the world’s biggest tech, energy, and financial services companies on 25 August 2021.

The Biden administration is doubling down on its effort to prevent cyber attacks, such as the Ransomware attack on Colonial Pipeline in April – a critical gas pipeline in the US that carries gasoline, jet fuel, and diesel from Texas to New Jersey.

After the summit, the US National Institute of Standards and Technology (NIST) announced they will work with industry partners to create “a new framework to improve the security and integrity of the technology supply chain.”

Dave Goossens, CEO of IT asset management platform provider Lansweeper, comments, “Cybercrime has never been a bigger threat to businesses as it is today, so it’s encouraging to see the White House taking the issue seriously by holding the Cyber Summit. However, cybersecurity isn’t just a problem for big businesses to worry about – it involves every single business doing their part and securing their assets.”

In 2020 alone, the US Federal Trade Commission received 1.4 million reports of identity theft, up 50% from 2019. Malware increased by 358% and ransomware was up by 435%. According to the PwC Global Economic Crime and Fraud Survey, 47% of companies experienced fraud in 2020. And with the average cost of a data breach reported to be $3.86 million, businesses cannot afford to ignore

Goossens continues, “The basic premise of good cybersecurity is that you can’t protect what you can’t see. So the critical first step when it comes to basic cyber hygiene is to maintain visibility of your IT environments and develop the relevant daily routines to inspect and verify. Having this information alerts IT departments to any potential vulnerabilities on unprotected networked devices that could pose a threat to corporate data and assets – a capability that’s especially important now that the majority of the workforce is remote.”

The basic premise of good cybersecurity is that you can’t protect what you can’t see. So the critical first step when it comes to basic cyber hygiene is to maintain visibility of your IT environments and develop the relevant daily routines to inspect and verify.


  Dave Goossens CEO Lansweeper Dave Goossens, CEO at Lansweeper

For many years, Asset Inventory has been at the very top of most industry-leading security frameworks such as ISO, NIST, and CIS. Indeed, the first element of the NIST core framework is “identify”, and it is in this area where Lansweeper provides a competitive advantage for businesses.

Download Your Checklist

Learn why Lansweeper is used by thousands of enterprises worldwide.u200b

Get Started

Unlike existing scenario-based ITAM solutions, Lansweeper leverages agentless discovery and agent-based scanning to rapidly assemble a complete and accurate IT asset inventory that provides users with end-to-end visibility of their IT asset ecosystem. 

This is the next evolution of IT asset managementITAM 2.0. It’s not just about adopting smarter, automated technology, but understanding and analyzing where IT assets are, what they do and how they’re being used. ITAM 2.0 turns the process of creating asset inventories on its head. Rather than collecting IT asset data to meet the criteria of specific IT scenarios, Lansweeper believes ITAM should be a scenario-independent endeavor, with the goal of creating a single source of truth.

Goossens concludes, “Many businesses have been rocked by disruption over the past 18 months from changing global economies to adapting to new work environments and use of home technology entering the corporate network – CIOs and IT leaders are now facing even more IT asset management challenges than ever before. Only with a complete, 360-degree view of an IT infrastructure can CIOs and IT leaders detect and protect corporate assets and their organization from the ever-evolving and rapidly expanding threat landscape.”

Key questions were raised at the White House Cyber Summit, and Dave Goossens provides the answers that all CIOs, IT, and business leaders should consider:

How do businesses secure their software and build better hardware?

Outdated software is vulnerable to various types of cybersecurity threats, so it’s critical to know every asset of your IT estate and make sure your systems receive all necessary updates and patches to keep your network safe. ITAM solutions will provide information about software versions and vulnerabilities, enabling you to quickly identify machines and devices in need of an update or patch.

Hardware doesn’t last forever, and old devices and services probably don’t have the most recent security upgrades. What’s more, hardware failures cause 53% of all data loss and system downtime. With information about your hardware assets and warranties available in your IT asset inventory, you can take rapid action to repair or replace outdated or damaged hardware, before they pose a risk to the organization.

How can companies put in place a strong incident response to cyber-attacks?

An IR plan should define roles and offer step-by-step technical instructions for how to fix the vulnerability, assess the damage, restore any lost or damaged data, and document the incident.

Having everyone aligned on a plan of action – with access to a central data repository so everyone’s working off the same information – will minimize the impact of an incident and protect the business from unnecessary damage and costs.

How can we use tech more securely?

The best method to protect against ransomware and cyber threats is not something an individual can do alone. However, there are best practices that we can all employ to drastically reduce the threat of a cyberattack.

  • Keep your programs and systems up-to-date
  • Do not click on unsafe links
  • Do not provide personal information to unknown sources
  • Do not open suspicious email attachments
  • Do not use unknown USB sticks
  • Only use trustworthy download sources
  • Use your VPN on public networks

CIOs and IT leaders need the tools to build and maintain a complete, up-to-date, and accurate IT asset inventory. Only then can they begin to minimize risk and optimize their IT with complete visibility and actionable insights into their IT estate.

Download Your Checklist

Learn why Lansweeper is used by thousands of enterprises worldwide.u200b

Get Started

Contact Information

  • Lansweeper: press@lansweeper.com
  • ITPR: lansweeper@itpr.co.uk

About Lansweeper

Lansweeper is an IT asset management software provider helping businesses better understand, manage and protect their IT devices and network. Lansweeper helps customers minimize risks and optimize their IT assets by providing actionable insight into their IT infrastructure at all times, offering trustworthy, valuable, and accurate insights about the state of users, devices, and software. Since its launch in 2004, Lansweeper has been developing a software platform that scans and inventories all types of IT devices, installed software and active users on a network – allowing organizations to centrally manage their IT.

The Lansweeper platform currently discovers and monitors around 100 million connected devices from 28,000+ customers, including Mercedes, FC Barcelona, Michelin, Sony, Carlsberg, Nestlé, IBM, Maersk and Samsung to governments, banks, NGOs, and universities, driven by its 150+ strong teams in Belgium, Spain, Italy, Ireland, UK and the USA.

Follow Lansweeper on Twitter and LinkedIn.