Maintaining a Foolproof cyber defense is tough task to perform but is is possible and that will give you endless possibilities of Cyber Security. Digital and business are inseparable today. The outlook for the evolution of a company’s turnover is just what a completely interconnected world can offer and where everything has become “scalable”.
For a company management, there is of course the job, but we must also rely on the technical heart of it, which becomes clearly its information system (SI). Its know-how and added value are composed of the data that are generated or transited there.
An indispensable four-step defense
For the CEO (the COMEX in general), it is unthinkable to have no security strategy, however some factors make it more difficult to implement. These include a “time to market” accelerated by cloud technologies, lack of security skills internally or an inadequate dedicated budget.
Yet the WannaCry ransomware alone costed the UK National Health Service (NHS) about 92 million pounds in various costs: service interruption and system upgrades (which involves two phases, namely during and after attack with systems restoration).
Today, it is necessary to consider the attack in 4 stages: Predict, prevent, detect and respond . Defenses must of course prevent, but sometimes the threat is detected only when it is in action. Then, you have to be able to clean it and make sure that it has not been hidden inside the machines (computer as server) on site as in the Cloud … At the risk of getting a salty note as lived the NHS lately!
This is also how the product range of the ESET publisher, a European specialist in computer security, is organized. Positioned as a challenger in the Gartner Magic Quadrant for Endpoint protection platforms, it offers products that act on all four aspects: prevention, then during and after execution.
Compliance to be respected in time
The IT security risk is far from being negligible, especially since new regulations (RGPD, NIS, etc.) must be relied on both at European and local level, forcing the COMEX to declare certain types of data loss. It is therefore necessary that the company management implements a suitable security policy.
Some security solutions help maintain this level of compliance. Thus, the multilayer supply ESET acts on all four levels and can therefore stop an ongoing threat that would have infiltrated by stopping on the second or third level.
Security challenges constantly growing
According to a study by the ESG analyst firm, 79% of IT and IT security professionals believe that cybersecurity in business (operational, management, skills …) is even more complicated today than it was two years ago before.
In question ? We note the increase in the number of malware (120 million new strains in 2017) combined with a higher level of complexity, but also the number of new IT initiatives within the company (Cloud computing, digital transformation, IoT applications …).
We can also add targeted cyberattacks (attacks are 80 to 90% of the time a single device according to ESG) or the growing number of devices connected to the network. Encrypted network traffic, hybrid clouds (private / public) are other reasons that make the task of professionals even more complex even though the Security budget is rising for nearly 92% of companies, this does not solve the lack of consideration towards Cyber security trades, nor the lack of human resources in this sector.
Adopt high-end security as a service to complete defense
So how to motivate your teams and choose the right strategy when you are COMEX? It is clear that within the company, a number of CxOs (CISO, CSO, CDO) are appointed to solve this type of problem. However, the CEO (and COMEX in general) is directly concerned by the slightest security failure. Recent cyber attacks have proven that just one of them is enough to have a major impact on a business.
And it is not for lack of having decided to invest in security most of the time. It is becoming difficult for companies that are well prepared to be present on all fronts. Not to mention that a complex attack requires sharp skills to defend itself.
” Security as a Service ” can become a solution by appealing to high-level specialists who will be able to come and support the internal teams of a company to fight, analyze, clean or even implement a solution quickly.
These services can also be subscribed with an MSSP. It accompanies the creation of the security strategy globally and applies it on a daily basis. However, when a complex attack is underway, it may happen that specialized and additional skills in this area are required to support it.
AI and Machine Learning essential against threats
Cyber-threat evolves and it becomes more and more difficult to stop the multiplication of attacks especially when they are targeted and complex. Despite the arsenal of protection installed, humans will always remain the last bastion because it is he, and he alone, who is able to analyze and detect the actual threats.
The AV-Test institute lists more than 700 million malware variants in 2017, of which 120 million have been classified as new. These vertiginous figures show how difficult it is for specialists to detect all these attacks in real time, even long after the attack.
AI (for Artificial Intelligence) coupled with Machine Learning (automation of basic tasks through patterns) seems to be the solution to the problem. These two technologies reduce the number of threats the analyst can process (by limiting the number of attacks that would have been set aside) and help the analyst fulfill his mission in a timely manner. Integrating AI and Machine Learning into products or services, however, requires a lot of experience.
The database is one of the keystones of this system and can feed Artificial Intelligence algorithms, although it does not consolidate in a day, or even a month or even a year! The quality of the database depends on the relevance of the models chosen to organize the data. For example, ESET has been supplying its database for 30 years.
This is an asset for this European security specialist who has developed algorithms based on artificial intelligence since 1998. “To exploit the database, it also requires experts able to analyze the results,” said Benedict Grunemwald.
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Recent Posts: TechnoBlogy