The changing of the guard. The new security playbook.
It’s no more about safeguarding your castle! As the castle doesn’t exist anymore.
Historically it was enough to safeguard your castle as the following could be assumed to be the norm.
- ICT platforms were on-prem
- Users were all accessing from office
- Personal devices were not allowed to connect LAN
- Servers were not exposed to outside world
So, having a good Antivirus software, Firewall, LAN segregation, Access controls would defend any type of threats like phishing scams, spam email or instant messages and bogus websites.
But the world has changed, and since the pandemic substantially accelerated the reimagining of work practices (by years in some estimates) it drove remote working at scale and Cloud migration which has exposed organisations to outer world like never before.
This has enabled the hackers to explore more options as cyber-attacks have increased many fold. These cyberattacks have evolved beyond theft of data but to control of physical assets too with real-life consumer impacts. Hackers often encrypt data on systems and demand ransom to decrypt it.
It’s time to reassess and amplify your preparedness for these attacks and ensure your existing security strategy is robust enough to deal with these evolving and relentless attacks on your ICT estate.
When reviewing your end-to-end security strategy, some security measures to be considered are:
- End Point Protection
- Data loss Prevention
- Security information and event management
- PEN Test
- Security Operations Centre
- Data Encryption
- Secure Access Service Edge
- Regular patching
- Business Continuity Management Plan
- Multi Factor Authentication and Just in time access controls
So, ask yourself a simple question:
Are you well defending your ICT platforms in this new digital era?
If you follow these simple steps you should be better prepared to defend any attacks.
- Create a Business Impact Assessment
- Select partners if required to assist
- Develop a Security Strategy
- Implement the security measures as per the above strategy
- Keep yourself up to date on all latest security threats and implement measures
If you would like any assistance with any of the above steps, I would only be too happy to help. Please reach out to me on LinkedIn or through my email firstname.lastname@example.org