Skip to main content

Don't rely on tech alone to protect against cybercrime

In the wake of last year's surge of debilitating ransomware attacks, many businesses are investing heavily in cybersecurity technology, with Gartner predicting that worldwide security spending will reach unprecedented highs at an estimated US$96 Billion this year alone. However, technology is only one of the components that make up a strong defence against cyberattack. Even with the right technology in place, organisations are still vulnerable to attack, and should protect themselves in other areas, too. For optimal cybersecurity, organisations can look towards addressing five key elements: people, processes, technology, change and culture. People, Processes and Technology have long been the cornerstones of Information Technology Infrastructure Library (ITIL) frameworks, often referred to as the "golden triangle" for successful project implementations and change management. The ability to implement change and an organisation's culture are just as critical to security and play an important role in today's rapidly evolving digital world. People People form the basis of any organisation. How they interact with customers, each other and the technology they use is important for business success. In many instances, cyber-attacks and security breaches arise because of human error or interaction. Whether a user downloaded a file containing malware or accessed and unwittingly shared data that they were not authorised to, data can be disseminated and infiltrated through sheer lack of knowledge of security principles. It is vital that organisations not only provide people with clear-cut policies on security protocols, but that it be enforced through frequent training, knowledge sharing and updates about those policies. Training should be part of any plan for security, risk management, business continuity and compliance. Knowledge sharing in the form of frequent reminders, updates on new malware and safety tips are great way to reinforce training and policies. People who are aware of what security risks are out there, and how they are able to protect themselves from those risks are better equipped to prevent cyber-attacks through accidental or unwitting actions. Processes A fundamental element of success, according to ITIL, is not only having the right processes in place, but ensuring they are adhered to. When organisations establish and reinforce processes for every action, things are done properly according to the prescribed steps. In security, if every member of a business follows the approved processes for securing, accessing and sharing data based on the parameters laid out for that type of data, the window for a security breach closes considerably. As soon as there are deviations, there is room for errors to be made. Technology We are living in a technology driven world and cybercriminals are developing smarter technologies to carry out attacks every day. To combat cybercrime, organisations needs to stay a step ahead, and this means investing in the right security technology. It's about more than just having the right firewalls and malware protection in place. By automating tasks and software updates, not only do we save time, but we also make sure that no critical task is forgotten or ignored, therefore compromising safety. Feature-rich tools, like IT Service Management Software, help identify potential risks, recognise security alerts, prioritise tasks and escalate incidents to the team experts easily and quickly. Risk and incident management becomes far more effective and businesses are then capable of responding faster to threats. Change Continual improvement forms the basis of ITIL. Businesses should to be prepared to refresh and update their systems, processes, policies and security often, to keep apace of changing security demands. Organisations who are dependent on dated technology - or who do not even know what technology they have in their businesses - are at risk of cybercrime. Organisations who rely on processes and policies which are designed around old cybercriminal behaviour are at risk of cybercrime. Updating infrastructure, policies and processes keeps everything current while minimising complexity and eliminating potential blind spots. Culture Maintaining a safe business environment is the responsibility off every member of the organisation, from senior management to end user. Where a culture of safe, secure practices is engendered, and security is prioritised, the other elements - people, processes, technology and changes - will automatically follow. By Edward Carbutt, Executive Director at Marval Africa. ALSO ON ITWEB AFRICA

Comments

Popular posts from this blog

Security company in Bellevue vandalized

BELLEVUE, Neb. (KMTV) - An Omaha home security company based out of Bellevue is using its own camera to help track down a thief who stole items from outside their building. Chris Malmberg, the owner of Omaha Security Systems Inc. says an unidentified man stole nearly $300 worth of landscaping Sunday night. "The motion sensors went off and I got a notification on my phone that he was there. We saw him take the plants, we watched him drive away and then immediately contacted police," said Malmberg. "He was real nervous, but he ended up stealing shrubbery, Hosta plants, I mean - never in my life have I ever known somebody to steal landscaping." Malmberg said the plants could be replaced, but what's frustrating is that this is one of several vandalism incidents his business has experienced since OSSI moved into the building near Jefferson and Mission Ave. "We've had vandalism, we've had items stolen, or attempted to be stolen, with the security that we...

Study: Majority of U.S. Broadband Households Concerned About Security of IoT Devices

As Internet-connected devices become more ubiquitous, security and privacy concerns of end users are also on the rise. Simply installing security systems in smart homes is no longer enough. Security integrators must also consider bolstering cybersecurity measures when installing their systems. A recently released whitepaper from IoT research firm Parks Associates, titled “Residential Security and Encryption: Setting the Standard, Protecting Consumers,” reveals that 64% of U.S. broadband households are concerned about security and privacy when using their connected devices. Parks Associates also found that the majority of homeowners assume security integrators are addressing their cybersecurity concerns. In fact, a Parks Associates survey of U.S. security owners found 63% of professionally monitored subscribers believe the wireless signals from their system are encrypted, even though encryption is currently not the industry-wide standard. While the whitepaper outlines a few ...

Ring Alarm review: A great DIY home security system with the potential to become even better

Ring builds some of our favorite video doorbells and security camera/outdoor lighting mashups. Now the company—recently acquired by Amazon—is moving inside the home with a strong and inexpensive DIY home security system: Ring Alarm. It’s a fantastic product today, and Ring says it will only get better with time. Ring Alarm is positioned as a mainstream home security system, and while you won’t find a great deal of innovation here (there’s nothing like the Nest Detect sensor that comes with the much-more-expensive Nest Secure system , for example), it’s already equipped with everything it needs to grow into a comprehensive smart home system. Ring Alarm doesn’t support smart lighting controls, door locks, thermostats, garage-door openers, or other common smart home products today, and there’s a very short list of supported third-party products. But it lacks nothing needed to support those and similar devices down the road. And in an intervi...