Cyber Security Investment

14 Dec 2018

Cyber Security Investment

Cybersecurity has become a crucial part of most large companies in industry. In fact, investments in this area are reaching an all-time high. Even with this increased investment, attacks on cyber-infrastructure are increasing as well in both quantity and complexity. The evidence is clear that innovation in the technology arena holds many benefits to those willing to do some investment, however, many times it simply opens the door for cyber criminals.
 
Now more than ever companies in industry need to be both industrious and methodical in their cyber security practices. Their primary focus should be on control mechanisms that have risk-based prioritization, to best defend against threats both known and emerging. Properly established security controls will help businesses in industry:
  • Establish processes for sensitive assets
  • Reduce risk
  • Assist Productivity
  • Cultivate business growth
  • Optimize cost objectives

 


key elements required  to properly establish cyber security

Security of Personnel Identification – Managed access to critical resources whether they are in the cloud, on company premises, or provided by managed hosting services. Personally identifying information (PII) is bits of information that can be found throughout the internet and dark web. This information provides bits and pieces of individual’s identities. These pieces can be put together to tell the digital story of an individual’s life. This information can be used to phish for information about a person’s work life or can be used to socially engineer information from the individual.

Protection of Data – Every time an intrusion is detected in a critical information system the “hole”gets patched up to ensure that no one else can get into the system the same way. However, you can bet as soon as the issue is addressed another “hole” is trying to be exploited. Security teams can reduce this data loss and lower risk by putting in place defenses that both protect from and detect the intrusion.

Infrastructure Hardening – As a company’s digital footprint expands so does the risk of a cyber-attack. Whether your digital hardware / software portfolio is managed on-premises, in the cloud, or even in some form of hybrid environment, systems require that technical attention be paid to the boundaries and the nodes. Modernization of a company’s security posture can include many options including: adoption of cloud-centric infrastructure, hybrid computing, software-defined networks (SDN), robotic process automation (RPA), blockchain, artificial intelligence, and more.

Intrusion Detection – Some will argue that the most critical part of any organization’s security and protection, is the boundaries. If a criminal cannot get past your boundaries then gaining access to vital hardware, software, or even data assets is a moot point. However, keeping all attacks at bay is just not a reasonable expectation. With that in mind it becomes of utmost importance that once an intrusion has taken place that it be detected as rapidly as possible to ensure that critical hardware, software, and data are not lost.

Vulnerability Management – This activity helps to understand where there are gaps in hardware configurations, operating systems, and applications that are exploitable. Unfortunately, many cyber security incidents are the result of exploitation of a known vulnerability. Even more unfortunate, is the fact that these are avoidable. It is extremely important that companies in industry approach this complex issue with a holistic risk-based approach.

Incidence Response – Nothing is more important once an incident has taken place than to immediately respond and begin the recovery process. Since incidents never take place in the manner in which they were practiced (assuming your company is proactive with cyber “wargames”), it is absolutely imperative that your response team be composed of individuals with the right knowledge and experience to deal with the fallout and see recovery through to completion.