Skip to main content

Don't rely on tech alone to protect against cybercrime

In the wake of last year's surge of debilitating ransomware attacks, many businesses are investing heavily in cybersecurity technology, with Gartner predicting that worldwide security spending will reach unprecedented highs at an estimated US$96 Billion this year alone. However, technology is only one of the components that make up a strong defence against cyberattack. Even with the right technology in place, organisations are still vulnerable to attack, and should protect themselves in other areas, too. For optimal cybersecurity, organisations can look towards addressing five key elements: people, processes, technology, change and culture. People, Processes and Technology have long been the cornerstones of Information Technology Infrastructure Library (ITIL) frameworks, often referred to as the "golden triangle" for successful project implementations and change management. The ability to implement change and an organisation's culture are just as critical to security and play an important role in today's rapidly evolving digital world. People People form the basis of any organisation. How they interact with customers, each other and the technology they use is important for business success. In many instances, cyber-attacks and security breaches arise because of human error or interaction. Whether a user downloaded a file containing malware or accessed and unwittingly shared data that they were not authorised to, data can be disseminated and infiltrated through sheer lack of knowledge of security principles. It is vital that organisations not only provide people with clear-cut policies on security protocols, but that it be enforced through frequent training, knowledge sharing and updates about those policies. Training should be part of any plan for security, risk management, business continuity and compliance. Knowledge sharing in the form of frequent reminders, updates on new malware and safety tips are great way to reinforce training and policies. People who are aware of what security risks are out there, and how they are able to protect themselves from those risks are better equipped to prevent cyber-attacks through accidental or unwitting actions. Processes A fundamental element of success, according to ITIL, is not only having the right processes in place, but ensuring they are adhered to. When organisations establish and reinforce processes for every action, things are done properly according to the prescribed steps. In security, if every member of a business follows the approved processes for securing, accessing and sharing data based on the parameters laid out for that type of data, the window for a security breach closes considerably. As soon as there are deviations, there is room for errors to be made. Technology We are living in a technology driven world and cybercriminals are developing smarter technologies to carry out attacks every day. To combat cybercrime, organisations needs to stay a step ahead, and this means investing in the right security technology. It's about more than just having the right firewalls and malware protection in place. By automating tasks and software updates, not only do we save time, but we also make sure that no critical task is forgotten or ignored, therefore compromising safety. Feature-rich tools, like IT Service Management Software, help identify potential risks, recognise security alerts, prioritise tasks and escalate incidents to the team experts easily and quickly. Risk and incident management becomes far more effective and businesses are then capable of responding faster to threats. Change Continual improvement forms the basis of ITIL. Businesses should to be prepared to refresh and update their systems, processes, policies and security often, to keep apace of changing security demands. Organisations who are dependent on dated technology - or who do not even know what technology they have in their businesses - are at risk of cybercrime. Organisations who rely on processes and policies which are designed around old cybercriminal behaviour are at risk of cybercrime. Updating infrastructure, policies and processes keeps everything current while minimising complexity and eliminating potential blind spots. Culture Maintaining a safe business environment is the responsibility off every member of the organisation, from senior management to end user. Where a culture of safe, secure practices is engendered, and security is prioritised, the other elements - people, processes, technology and changes - will automatically follow. By Edward Carbutt, Executive Director at Marval Africa. ALSO ON ITWEB AFRICA

Comments

Popular posts from this blog

Bureze Security News for 07-04-2018

Security Systems, Surveillance Cameras, Cellular Communications A professionally installed security system will help protect your business, employees, and property. With affordable add-on options, you can remotely control your system, as well as lights, door locks, thermostats, and more. You can even add video cameras, and view or record them on your smart phone. One system provides protection and remote control for your business. Sterling Security Systems, a locally owned company founded in 1993, offers far more than parts.  Sterling Security is an authorized Bosch & DMP dealer. Our technicians are factory trained and certified in the installation and service of Bosch & DMP equipment. Sterling Security Systems alarm monitoring centers provide protection around the clock, every day of the year. Our state-of-the-art alarm monitoring centers are so sophisticated they automatically back each other up in Fast Alarm Response Times Always On-Ca...

Bureze Security News for 04-29-2018

[embed]http://www.youtube.com/watch?v=9XLLo0025Jc[/embed]Security...or Surveillance? The Edward Snowden Interview Closed-circuit television In recent years, the use of body worn video cameras has been introduced as a new form of surveillance, often used in law enforcement, with cameras located on a police officer's chest or head. Video surveillance has generated significant debate about balancing its use with individuals' right to privacy even when in public. Special cameras for some of these purposes include line-scan cameras and thermographic cameras which allow operators to measure the temperature of the processes. With the addition of fixed cameras for the active traffic management system, the number of cameras on the Highways Agency's CCTV network is likely to increase significantly over the next few years. The cameras send the feed to a central control center where a producer selects feeds to send to the television monitors that fans can view.  New York C...

Security company in Bellevue vandalized

BELLEVUE, Neb. (KMTV) - An Omaha home security company based out of Bellevue is using its own camera to help track down a thief who stole items from outside their building. Chris Malmberg, the owner of Omaha Security Systems Inc. says an unidentified man stole nearly $300 worth of landscaping Sunday night. "The motion sensors went off and I got a notification on my phone that he was there. We saw him take the plants, we watched him drive away and then immediately contacted police," said Malmberg. "He was real nervous, but he ended up stealing shrubbery, Hosta plants, I mean - never in my life have I ever known somebody to steal landscaping." Malmberg said the plants could be replaced, but what's frustrating is that this is one of several vandalism incidents his business has experienced since OSSI moved into the building near Jefferson and Mission Ave. "We've had vandalism, we've had items stolen, or attempted to be stolen, with the security that we...