The Shifting Sands of Cybersecurity

The rise of new digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, has led to a surge in the number of endpoints and potential ways for cyber-criminals to gain access to enterprise networks. 

This has led to a major evolution of the  cyber battlefield. Today’s security teams are having to come up with new tactics to fend off the more advanced threats being levelled against their increasingly interconnected enterprise networks.

The battle against these cyber criminals was traditionally regarded as a concern for the IT department, but the widely documented breach at Sony in 2014 put cyber-crime at the top of the business agenda.

Organisations realised that a breach, compromise or attack could have a major impact on business performance, brand perception and, most importantly, the financial bottom line.

Security became an enterprise-wide issue that needed addressing, and managing risk, a business priority. However, even after the Sony attack, security hadn’t necessarily become the board-level concern that it is today.

More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organisation to create chaos and cost millions. In WannaCry’s case, this attack affected huge organisations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect.

If board members weren’t paying enough attention to the need for better cyber-security defenses before, they certainly are now.

Additionally, changes in regulation and compliance requirements, alongside a better understanding of the potential reputational risk of a breach, has highlighted why security must be top of the agenda, not just for the board, but for every employee and supplier.

With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyber-attacks:

Security’s outreach has increased: No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations, whether local, regional or even global, and every department it touches.

It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data (held in the cloud, on mobile devices and generated by IoT) is in transit and potentially a moving cyber target.

Adaptive enterprises are leveraging digital transformation and that impacts how they also use security, linking it back to business objectives; enabling disruptive business models such as mobile banking, and strengthening their focus on cyber-threats.

Security is built into innovation: IT security is no longer a barrier to change, hindering the adoption of new processes and the adaption of innovative technologies.

In fact, security is front and center in the new digital world. It is accelerating ‘speed of service’; embedded in Software Defined Networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset.

Security has to be responsive, agile, and intelligent: Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets.

Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us.

Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber-threat visibility and mitigating risk.

This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights.

We might not have a crystal ball, but we do know that innovation and digitisation will not stop. They will continue to grow at an exponential pace, and remain crucial for business success.

For businesses to stay relevant now and in the future means embracing new technologies, defining strategies that deliver (and exceed) on customer experience, and taking a proactive security approach.  

Verizon’s 2017 Data Breach report shows that the same threat tactics are still effective in infiltrating data, because many organisations are missing foundational security tools and processes.

Faced with the increasing threat of cybercrime, businesses can’t be reactive anymore. They must look towards improving their cybersecurity systems, as there is too much at stake, no one wants to become a victim of the next WannaCry or Petya.

Infosecurity:

You Might Also Read: 

Cyber Criminals Have Access To Weapons Grade Hacking Tools:

WannaCry Drives Cyber Insurance:

 

« What is Big Data?
A Global Issue: Cybercrime In Singapore »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.

Eye World

Eye World

Eye World, founded in 2015, is one of Northern Europe’s leading and fastest-growing providers of SaaS solutions in Cyber Security.