Enterprise security must change

October 2019 Cyber Security, Security Services & Risk Management

The recent wave of cyberattacks against local banks has highlighted the importance of protecting data against malicious users. With data being the most critical asset of any organisation irrespective of size and industry sector, there is also a greater degree of vulnerability to contend with.

Organisations are running their critical operations on emerging digital technologies, deploying more applications on more devices in more geographies than ever. This digital approach is also creating greater exposure to equally sophisticated levels of cyberattacks. A traditional approach towards cyber defence is no longer good enough. Instead, a higher level of protection is required to protect business-critical data.

Security spending is expected to reach $174,5 billion by 2022 as a result of digital transformation initiatives, regulatory compliance pressures, and the rising number of cyberattacks. This indicates that organisations are starting to pay more than lip service to rethinking their strategies when it comes to their defences as well as threat mitigation.

As part of this process, there are several elements to consider for cybersecurity to be more effective.

It all starts in the boardroom. Leadership must prioritise cybersecurity. But to do so, they must understand the extent of the problem. Fortunately, media reports about data breaches are helping raise awareness of the issue. Hopefully, it will become a key boardroom talking point sooner rather than later. As part of this, cybersecurity must be a business-wide priority. Even though cost-cutting initiatives are taking priority in difficult economic conditions, investments must be made in more effective cybersecurity measures.

Of course, this does not mean cybersecurity is only the priority of management. All employees must be held accountable, especially if social engineering is involved in attacks. This also necessitates better (and ongoing) education initiatives inside the organisation.

Mobile environment

It is a widely-held belief that the most significant cyber breaches come from inside the business. Employees are careless with company data and untrained when it comes to cybersecurity principles, especially regarding their use of mobile devices.

IT departments must take a more active role in protecting employee devices, especially with so many organisations allowing for personal smartphones and tablets to be used at the workplace. This is where an end-to-end security approach that protects information and apps from the mobile phone to the data centre, whether it is on-premise or in the cloud, must be fundamental.

Moreover, security breaches can have a wider impact than initially thought. While damage to customer trust is significant in a highly competitive environment, do not underestimate the impact of lost confidential data, the impact on future revenue, as well as reduced staff morale can have on the company.

Becoming compliant

With the regulatory environment also evolving, care must be taken to ensure the company remains compliant with data governance. The financial implication (not to mention reputational damage) non-compliance can have is significant. To this end, every person in a company must understand that there are no exceptions to complying with security policies, irrespective of their position in the organisation.

IT departments must take charge in this regard and ensure the organisation remains ever vigilant. This does not mean cybersecurity policies are developed once and only reviewed annually. Instead, defences must adapt faster to reflect the agile environment of the digital landscape. This is especially true given the move towards cloud-based solutions and managed environments.

Cybersecurity is an evolving component that is key to business success in the connected world. It needs constant vigilance if the organisation is to mitigate the risk of having its data compromised.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
The importance of XDR for cyber protection
October 2019 , Cyber Security, Products
35% of South African organisations are expecting an imminent cyberattack and a further 31% are bracing for it to happen within a year, according to local research conducted by Trend Micro.

Read more...
Kaspersky uncovers zero-day in Chrome
October 2019, Kaspersky Lab , News, Cyber Security
Kaspersky’s automated technologies have detected a new exploited vulnerability in the Google Chrome web browser.

Read more...
Body-worn cameras transforming security
October 2019 , CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
Police Service Northern Ireland now has over 7 000 officers using 2 500 cameras covering approximately 173 000 incidents each year.

Read more...
Protecting your customers’ data
October 2019 , Training & Education, Security Services & Risk Management
Simon Murrell, head of development and executive director at BrandQuantum says companies need to protect their customers from identity theft and data breaches.

Read more...
Cybersecurity for video surveillance systems
September 2019 , Cyber Security, CCTV, Surveillance & Remote Monitoring
Video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Read more...
Cyber-securing your surveillance infrastructure
CCTV Handbook 2019, Genetec, Hikvision South Africa , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
When it comes to cybersecurity, understanding the risks and the solutions as well as engaging in open communication helps everyone.

Read more...
Cybersecure surveillance partnership
CCTV Handbook 2019, Bosch Building Technologies, Genetec , Cyber Security, CCTV, Surveillance & Remote Monitoring
With Bosch and Genetec, you can feel confident that your data is protected by one of the world?s best security solutions, end to end, day after day.

Read more...
Keeping your things to yourself
October 2019, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Three experts spoke to Hi-Tech Security Solutions to offer advice on keeping your IoT working for you and not for cyber criminals.

Read more...