Using tomorrow’s tools to solve ­today’s security problems

Access & Identity Management Handbook 2019 Access Control & Identity Management, Information Security, Integrated Solutions

Organisations that do not have a clear longer-term security roadmap in place are putting themselves at risk of being compromised. The companies are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions. This is the view of Jon Tullett, research manager – IT Services for sub-Saharan Africa at International Data Corporation (IDC).

Jon Tullett.
Jon Tullett.

“The first step in creating this roadmap is to start getting their security under control,” he says. “This includes using analytics for behaviour anomaly detection at both a network and user level, gathering the data to do baseline profiling. While that is the type of thing we are already doing today, many organisations are still not doing it with a long-term view in mind.”

To get their security under control, organisations must consider technologies that play to the cloud and be prepared to evolve with the technology. User awareness and training also remain key fundamentals that are receiving enough attention. “At the moment, training budgets are horrifically small and that must be addressed. Start by spending the money, but more importantly, evolve that training over time.

“Today, the breach is a credential theft or phishing attack. Companies that tackle that, and really invest in training, see tremendous reductions. A good example of this is Google, which combined good training with two-factor authentication for all their internal services and, since they’ve done that they’ve had zero phishing cases, but now they’ve moved on,” says Tullett.

Granular access rights

He says once organisations have this under control and have done the risk assessments required, they must start devolving those rights. “Break it up and create far more granular access controls. Create accounts which can only do very specific tasks, so that if they are compromised, the damage the hacker can do is limited. That also means that you have to start evolving the technologies that you’re using to ones that support this. While it can be a pain to do it on some platforms, it is usually baked into modern cloud platforms. The key here is to ensure that should you need to revoke access on mass, you can do it.”

The next step is to roll out two-factor authentication much more aggressively. “For users that may mean a token, mobile authentication or something similar and for system accounts it will probably mean digital certificates. Whatever it may be, start to improve your authentication. Once you have that in place, you really want to be on top of activity management. So, looking at what accounts are doing what.

You can’t really do this until you have your accounts consolidated and organised, but you want to know everything that an account does in a very standard format. That allows you to feed the information into an engine and get an activity report back when something goes wrong, so that you can identify any anomalies and address them quickly.

Cloud evolution

He believes that within the next two years, most of this type of anomaly detection will be happening largely out of the cloud. “This is going to happen alongside your evolution to cloud. The AI platforms in the cloud are maturing very fast, so within the next couple of years we’re expecting to see an awful lot of cloud services just plugging AI in because they can. So, there will be a lot of machine learning happening and, further down the line, we will see people looking at how they can use that to optimise and automate,” says Tullett.

“In the longer-term, organisations will also start looking at automation, where an anomaly will be detected, and automatically investigated and remediated. While it will take a couple of years for this to happen, organisations must include this in their security roadmaps. Today’s problems are that you need to start getting your identities under control and doing better analytics, but tomorrow that same platform is going to be your machine learning platform and is going to be a complex, better managed identity platform that will do a lot more things.”

He points out that the criminals also have a roadmap and it is often more advanced than those of organisations. “They know what technologies are coming, they are getting the required skills in place and are already looking at how to use the technology for various purposes. They are following a roadmap and if you are not doing the same, they are leaving you behind.

“You must remember that these are career criminals, this is what they do for a living, and so, if you make it impossible for them to phish, they are going to find something else to compromise. What they are doing will evolve in response to you. If we can eradicate phishing, that’s great, but that threat is going to move to something else and you must be willing to keep following that path.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...