Halftime’s Over! New Cyber Security Ideas for the Second Half of 2016

Oscar Marquez

Oscar Marquez is the Chief Technology Officer and founding member of iSheriff, with overall responsibility for world-wide, support and the development and delivery of the company's world-class cloud security products. He was an early pioneer in Web and Email cloud security services and the development of near-zero latency global data center infrastructures. Marquez has more than 20 years of experience in the security and technology industries, including senior executive and technical roles with M86 Security, Tier-3, Ubizen, NetiQ, Siemens Nixdorf and Novell. He holds a BA in Computer Science from the University of Barcelona.

In the last 5 years, businesses of all sizes have realized just how vulnerable they are to cyber-attacks.

The astonishingly increasing number of attacks each year trouble corporate heads so much that they spend hours on end discussing their company’s cyber security system. The IT professionals and Chief Information Security Officers (CISOs) are even more troubled, for they keep seeing their efforts foiled by hackers.

The number of large corporations targeted in 2015, and so far in 2016, only goes to show that no one is completely safe. Wherever you look, there is an Ashley Madison data breach or a Home Depot or JP Morgan Chase story from the past year that will make you realize just how precarious security structures are.

In sports, teams regroup at halftime and get back to work in the second half with a refocused goal of finishing the game strong. The same holds true for security practices. To help corporations beef up their security better in the second half of 2016, here are some fresh ideas to keep your data safe:

  • Be Aware of Stored Data
  • Focus on Protecting Data
  • Address the Mobile Threat
  • Spread Awareness
  • Take Insider Threats Seriously

It is quite astonishing how many big firms do not have any idea what huge chunks of data in their systems are about. Technologies such as the Internet of Things (IoT) have a lot to contribute to this, but company data should be handled better. One must at least know what is stored in their systems. That would provide them an idea as to what data is of the most priority and what needs to be protected most against threats.

The most infamous cases of 2015 related to data breaches of global services and corporations. Yet, corporations think that beefing up their firewalls and security perimeters is the answer to such attacks. They couldn’t be less accurate. Attacks like these go to show that protecting your data is the main priority. Encrypting different clusters of data with secure mechanisms is vital to prevent data from being compromised easily should unauthorized personnel make it into corporate network.

Many corporations use the idea of Bring Your Own Device (BYOD), allowing employees to use their personal device in the workplace. It is always safe to assume that most employees do not take the necessary security measures for their mobile devices. This invariably puts corporate data on such devices at great risk. IT admins need to have better control over such devices. They need not have more control, but better control.

It is never a bad time to spread awareness among employees, however small or high ranking they are, about the different threats they face. Ignorance should never be doubted or disregarded, for it is always present around you. Interacting with employees regularly about the different threats present and sharing ideas about improving security are good practises.

You might shell out millions of dollars trying to protect your network from outside threats only to be undone by one of your employees clicking on a wrong link and compromising some sensitive data on his or her system. Hackers regularly send malicious emails to many employees in a firm in hopes that one of them falls for it, and they quite frequently do. Encourage your employees to be more vigilant, for such emails can quite easily be spotted.

About the Author

Oscar Marquez is Chief Technology Officer and a founding member of iSheriff, with overall responsibility for world-wide, support and the development and delivery of the company's world-class cloud security products.

Tags: insider threats, cyber-attacks, Internet of Things (IoT), CSO Australia, Chief Information Security Officers (CISOs)

Show Comments