Enterprise security must change

1 October 2019 Information Security, Security Services & Risk Management

The recent wave of cyberattacks against local banks has highlighted the importance of protecting data against malicious users. With data being the most critical asset of any organisation irrespective of size and industry sector, there is also a greater degree of vulnerability to contend with.

Organisations are running their critical operations on emerging digital technologies, deploying more applications on more devices in more geographies than ever. This digital approach is also creating greater exposure to equally sophisticated levels of cyberattacks. A traditional approach towards cyber defence is no longer good enough. Instead, a higher level of protection is required to protect business-critical data.

Security spending is expected to reach $174,5 billion by 2022 as a result of digital transformation initiatives, regulatory compliance pressures, and the rising number of cyberattacks. This indicates that organisations are starting to pay more than lip service to rethinking their strategies when it comes to their defences as well as threat mitigation.

As part of this process, there are several elements to consider for cybersecurity to be more effective.

It all starts in the boardroom. Leadership must prioritise cybersecurity. But to do so, they must understand the extent of the problem. Fortunately, media reports about data breaches are helping raise awareness of the issue. Hopefully, it will become a key boardroom talking point sooner rather than later. As part of this, cybersecurity must be a business-wide priority. Even though cost-cutting initiatives are taking priority in difficult economic conditions, investments must be made in more effective cybersecurity measures.

Of course, this does not mean cybersecurity is only the priority of management. All employees must be held accountable, especially if social engineering is involved in attacks. This also necessitates better (and ongoing) education initiatives inside the organisation.

Mobile environment

It is a widely-held belief that the most significant cyber breaches come from inside the business. Employees are careless with company data and untrained when it comes to cybersecurity principles, especially regarding their use of mobile devices.

IT departments must take a more active role in protecting employee devices, especially with so many organisations allowing for personal smartphones and tablets to be used at the workplace. This is where an end-to-end security approach that protects information and apps from the mobile phone to the data centre, whether it is on-premise or in the cloud, must be fundamental.

Moreover, security breaches can have a wider impact than initially thought. While damage to customer trust is significant in a highly competitive environment, do not underestimate the impact of lost confidential data, the impact on future revenue, as well as reduced staff morale can have on the company.

Becoming compliant

With the regulatory environment also evolving, care must be taken to ensure the company remains compliant with data governance. The financial implication (not to mention reputational damage) non-compliance can have is significant. To this end, every person in a company must understand that there are no exceptions to complying with security policies, irrespective of their position in the organisation.

IT departments must take charge in this regard and ensure the organisation remains ever vigilant. This does not mean cybersecurity policies are developed once and only reviewed annually. Instead, defences must adapt faster to reflect the agile environment of the digital landscape. This is especially true given the move towards cloud-based solutions and managed environments.

Cybersecurity is an evolving component that is key to business success in the connected world. It needs constant vigilance if the organisation is to mitigate the risk of having its data compromised.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...