Finance

Cybersecurity: How Companies Can Turn into Safer and Extra Resilient

cybersecurity-how-companies-can-turn-into-safer-and-extra-resilient

According to an industry estimate, almost a third of cyber incidents are caused by weak access control mechanisms / IDS intrusion detection services.

From Joyjeet Bose

The sudden move from home to work has catalyzed the digital enabling of business environments and the transformation of the workplace. When employees log on remotely to access the corporate network through their home broadband network, they inadvertently open up a variety of new attack vectors. Here are some cybersecurity strategies organizations should employ to make their operations more secure and resilient.

Zero trust approach
To improve overall security, organizations need to implement tools that support SSO (single sign-on), identity protection, and multi-factor authentication (MFA). With the zero trust approach, organizations create trust for every access request, regardless of where the request came from. Access control methods such as DAC, MAC, RBAC and ABAC (Discretionary, Mandatory, Role & Access Based Access Control) must be implemented at different levels.

Cyber ​​awareness and hygiene
Companies have to implement IDS (Intrusion Detection Services) and train their employees digitally. They need to communicate regularly with their employees about cybersecurity protocols and develop training programs on data security and privacy issues. The training programs can include identifying phishing attempts, using a secure VPN, and using end-to-end tools for encrypted collaboration.

Regular software updates
The increase in cyber attacks is also a constant reminder of the importance of driving regular software updates with security patches in the system. According to an industry estimate, almost a third of cyber incidents are caused by weak access control mechanisms / IDS intrusion detection services.
With the new standard of remote working, companies are using the concept of bringing their own device (BYOD) or company-owned, personally activated devices (COPE). These devices should be upgraded with tools like (AMP) to improve protection against malware, to avoid active, passive attacks, and to the updated software version with all regular security patches. In addition, companies should have an intelligent unified endpoint solution that gives their IT department more transparency, security and awareness.

SaaS orchestration (Security as a Service)
Companies need to invest in cost-effective and comprehensive SaaS (Security as a Service) solutions. You can bypass cyber threats with a platform-based cloud content security provider that includes web, email, endpoint security, next generation firewall and multi-factor authentication services.
With the fast-moving workforce and the ever-changing environment, there is a need for smart business solutions that provide access to a comprehensive range of smart perimeter security that is robust, scalable and easy to deploy. As service providers introduce new capabilities, organizations need to keep pace with innovation and have a specific cybersecurity plan in place to implement these market-leading threat protection solutions.

The author is Senior Vice President – SME Operations, Tata Teleservices

Get live stock quotes from BSE, NSE, the US market and the latest in net asset value, portfolio of mutual funds, calculate your tax with the Income Tax Calculator and know the top gainers, top losers and best equity funds in the market. Like us on Facebook and follow us on Twitter.

Financial Express is now in the telegram. Click here to join our channel and stay up to date with the latest news and updates from Biz.

0 Comments
Share

Steven Gregory