Adapt or be hacked

March 2017 Information Security, Infrastructure

As an industry, the security sector has much work to do. So says Wayne Olsen, security business unit manager at Datacentrix. He says vendors within this space have not traditionally been adaptive enough to keep up with the speed at which the threat landscape is changing.

“Although it is probably more fair to say that it is actually the infrastructure that is non-adaptive to ever-increasing numbers of threats,” he continues.

And there’s no doubt that breaches are on the rise. Forrester Research, in its ‘Predictions 2017: Cybersecurity Risks Intensify’ study, forecasts that this year in excess of 500 000 Internet of Things (IoT) devices will suffer a compromise, a Fortune 1000 company will fail due to a cyber breach, and that President Trump will face a cyber crisis within the first 100 days of his term.

“This type of statement begs the question: ‘If you saw it coming, why didn’t you stop it?’ Security has been within the top three concerns for the CIO worldwide for the past decade and there’s good reason for this. In fact, the Society for Information Management’s (SIM) recently-released trends analysis for 2017 noted that 36% of IT leaders saw security as their number one concern.

“One of the major challenges within this space is that, while companies are aware of the importance of safeguarding themselves and are frantically introducing new security technologies, these solutions are siloed and thus operate in isolation,” Olsen explains.

The solution to this dilemma? Getting the foundation right by deploying architectures that customers can lean on to deploy new technologies that will work effectively together. “This is of particular importance when it comes to cloud-enabled capabilities and applications. Without the correct architecture in place, adding layer upon layer of technology is like building a brick wall onto mud – it’s just going to fall over at some point.

“There is no silver bullet when it comes to security,” says Olsen. “It is inevitable that an organisation will be attacked at some point; what’s important is how the severity of the attack is mitigated. Going back to basics by ensuring that it has an adaptable architecture in place and ongoing staff education, as well as the correct, regularly reviewed policies and the technologies needed to enforce these policies will stand a company in good stead.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Western Digital reveals new solutions
Products & Solutions News & Events Infrastructure
Western Digital unveiled new solutions and technology demonstrations at the Future of Memory and Storage Conference 2024. The innovations cater to diverse market segments, from hyperscale cloud to automotive and consumer storage.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...