cybersecurity focus

How COVID-19 has changed cybersecurity focus for 2021

by | Nov 28, 2020 | Covid-19, IT Security

A massive expansion of the distributed workforce has resulted in changing cyber-attack patterns, targeting organizations to steal critical data and demand ransom.
Share to lead the transformation

The COVID-19 pandemic – and the unprecedented lockdowns that followed soon after – dramatically changed the way of working for all enterprises. Before COVID-19, many enterprises were halfhearted to adopt the work-from-home concept, even on a trial basis. However, due to the pandemic, they quickly modernized their processes and fortified cybersecurity focus to deliver an effective remote-work environment.

While 2020 has been a year of adjustment to the crisis, 2021 will be a year of more robust digital transformation initiatives to expand the remote workforce capabilities and strengthen corporate resilience. This unparalleled workplace transition also requires businesses to build newer strategies to protect employees’ networks by augmenting their cybersecurity architectures.

In a recent report titled McAfee Threats Report: November 2020, Cybersecurity firm McAffe observed the rise of an average of 419 new threats per minute in the second quarter of 2020, with an astounding 11.5 percent growth of new malware samples.

cybersecurity focus

A tough year from a cybersecurity focus standpoint

During 2020, cybercriminals adopted a range of diverse tactics to target network vulnerabilities and found new opportunities to launch attacks. Companies have witnessed a massive rise in targeted ransomware attacks, large-scale DDoS (distributed denial-of-service) attacks, and malware spread throughout the year.

From the Twitter Bitcoin hack to the temporary halting of the New Zealand stock exchange (NZX), the year impacted diverse industries in a colossal way. In March 2020, hospitality major Marriott International stunned everyone by acknowledging a major hacking incident on its information networks, revealing 5.2 million guests’ data.

The year saw many cybercrime campaigns being launched with pandemic themes of Covid-19 in a bid to exploit the rising remote workforce. Phishing and malware-driven intrusion has drifted away from the organizational network to end-user devices in the distributed workspace environment. Even with the best of breed tools and resources, many big companies could not predict cybersecurity attacks’ patterns.

Another growing concern is the emergence of deepfakes, where sophisticated technologies such as artificial intelligence are exploited to manipulate audio-visual content, such as cloning the voices of influential people to commit financial crimes. A notable example that made headlines during 2020 was Belgium’s deepfake video release showing Belgium’s prime minister speaking of a pressing need to handle the economic and climate crises. The speech was considered real by many viewers.

Many industry observers have warned that fraudsters could leverage such technologies in the future to bypass voice-recognition systems and access critical data.

New strategies for dealing with emerging threats

Most IT security and data management specialists have been showing concerns around the rising sophistication of attacks and the complex cybersecurity landscape. There is no crystal ball to accurately forecast the IT Security landscape. However, the year 2021 will see enterprises making substantial efforts to deploy real-time solutions that can immediately detect and halt anomalies and suspicious behaviors. (See: Top enterprise cybersecurity trends of 2020).

According to Sophos, a global cybersecurity solutions provider, by 2021 industry could witness more sophisticated cybersecurity attacks, targeting larger organizations with multimillion-dollar ransom demands.

Cybersecurity Ventures, another global security solutions firm, projects that Ransomware attacks will continue to accelerate. And businesses in 2021 will suffer one ransomware attack every 11 seconds. It also predicts that the cost of ransomware to businesses will reach $20 billion and that global damages from cybercrime will reach $6 trillion in 2021.

This emerging threat landscape will push organizations to focus on disruptive technologies and solutions to get real-time security assessments across various endpoints, irrespective of employees’ location or network (See: Combating cyber threats in the new normal).

In the year 2021, a considerable cybersecurity focus will be on reviewing the IT security areas that are too expensive to implement. While risk parameters and the likelihood of data breaches are steadily increasing, organizations would also need to keep financial viability in mind and focus on solutions that could give them a better return on investment.

With the expansion of IoT connected devices shortly, networks will be more vulnerable to large-scale multi-vector cyberattacks. In the second half of 2021, organizations’ cybersecurity focus is likely to revolve around fast-tracking their deployment efforts around advanced solutions to protect their networks and clouds and enhance security controls.

Going ahead, CISOs are expected to focus on technologies that could drive the adoption of secure cloud solutions, align technologies closely with business objectives that can foster innovation and growth (See: Here’s how the new Cyber Security Policy could reshape CISO roles).

There will be a continuous focus on remote monitoring capabilities, automation, and zero-trust models for robust user access patterns (See: CIOs to focus on network transformation for business continuity).

MORE FROM BETTER WORLD

Rajesh Aggarwal joins Aamor Inox as Head of IT

Rajesh Aggarwal joins Aamor Inox as Head of IT

Rajesh Aggarwal

Rajesh Aggarwal

Aamor Inox has roped in Rajesh Aggarwal to head the company’s IT department in India. Aamor Inox is a leading maker and exporter of cold-finished long products in specialty stainless steels in India.

In his new role at Aamor Inox, Rajesh will be responsible for designing and implementing the cybersecurity policy and executing the ERP.

Prior to Aamor Inox, Rajesh Aggarwal was with the JBM Group, where he was responsible for designing and executing the IT business strategy. He has earlier worked with companies such as Jindal and Jagsonpal Pharmaceuticals.

Rajesh has more than three decades of rich IT management experience in developing, designing, and implementing IT business solutions, and has a deep understanding of ERP systems.

In his earlier role, he has carried out a re-implementation of SAP ECC (6.0), implementation of Industry 4.0, and upgradation from SAP ECC(6.0) to SAP HANA, among other things.

Rajesh is an MBA in Finance from IGNOU. In his free time, Rajesh enjoys reading spiritual books and listening to music. Better World wishes him every success in his new role.

About Aamor Inox

Aamor Inox claims to be India’s most advanced producer of “specialty stainless steel” long products. It produces materials in a wide-ranging steel grades like Austenitic, Ferritic, Martensitic, Heat Resisting, Duplex and 17-4ph steels in various heat treatment conditions including Quenched Tempered, Annealed, Solution Annealed, etc.

A capability to manufacture 60,000 tons stainless steel bars per year makes the company one of India’s largest privately held stainless long products companies,.

For other recent C-Track movements, click here.

AI, ML see rapid uptake in measuring customer loyalty

AI, ML see rapid uptake in measuring customer loyalty

The COVID-19 has transformed the way businesses function. In the wake of social distancing measures that are likely to remain in place for an extended time, a large pool of customers are swiftly moving toward new-age digital and mobile marketplaces. Moreover, the tendency has transitioned from just brand to purchase experience, quality of service, and customized needs. This has driven top CRM players to realign their AI-based offerings in line with the growing enterprise need to measure customer loyalty effectively.

According to a McKinsey report titled “The Quickening,” e-commerce has experienced the same amount of growth in three months during the COVID that would have erstwhile taken ten years. Due to this, consumers are going with fitting, reliable brands and have the products and services they are looking for.

Microsoft has also echoed similar sentiments in its blog. According to Microsoft, COVID-19 has greatly changed consumer behavior, and consumers are now buying more online and gravitating toward contactless pickup of purchases. It adds that retailers who invest in digital technology are better positioned to deal with this new shift and stay connected with existing customers while also attracting new ones. Use of AI and ML to measure customer loyalty has become increasingly relevant for businesses.

Battle of the giants

Understanding this new shift in consumer behavior, global CRM leader Salesforce has introduced a new brand loyalty management solution that will enable its customers to strengthen customer trust and engagement. The latest offering has been introduced, keeping in mind the rapidly evolving unique enterprise needs to reward and retain their customers amidst the global pandemic.

Starting in February 2021, Salesforce will integrate the new brand loyalty solution with Salesforce Digital 360Service Cloud, and Tableau, allowing enterprises to offer a customized loyalty experience across the entire customer journey.

Salesforce said that the solution would help enterprises of all scales and sectors to launch more customized experiences. According to the company, enterprises can leverage this solution to expand their loyalty programs to stay current with customer expectations. It can also help drive business value by creating loyal, lifelong customers. (See: How will AI impact enterprise ecosystems in 2021? )

Salesforce, though, is not the only CRM leader trying to capitalize on this new opportunity. Microsoft too is continuously looking at making its Microsoft Dynamics 365 more evolved and enable its customers with deep, intelligent insights.

Another CRM major SAP has been quite aggressive in leveraging AI and ML learnings to improve customer interactions. In October last year, it launched a new SAP Customer Data Platform to connect every data source in an organization and external data to create unified customer profiles. SAP claims that the tool enables enterprises to provide a complete understanding of customer preferences and behavior.

Technology to play a big role

Most businesses are looking at leveraging advanced technologies and solutions to understand customers’ specific needs. There has been a growing focus on smart solutions based on artificial intelligence and analytics, which can help organizations determine the best ways to engage with specific customer needs and include promotions and offers based on real-time data. For example, a retailer can identify which of his customers are near a store, using geolocation-based notifications or whether customers have used their bonus points or can be offered some new incentives to get them back.

In 2021 and beyond, enterprises, especially, retailers will see the growing adoption of tools based on artificial intelligence to deliver unique customer experiences and drive impactful brand engagements. Top CRM players such as Salesforce, Microsoft,  Oracle, and SAP are expected to add new machine learning capabilities in their CRM offerings to enable their users to automate the customer loyalty measurement process and deliver more incredible customer engagement benefits.

Telcos eying the edge opportunity for 5G growth

Telcos eying the edge opportunity for 5G growth

Top telecom operators are rapidly building strong foundations for future 5G networks. The next-generation wireless technology, which is ten times faster than the current LTE networks, has the potential to transform people, processes, and policies innovatively. Given that many global service providers have turned to bolster telco edge capabilities and putting them at the core of their 5G infrastructure goals.

According to a GSA report, as of December 2020, 140 operators in 59 countries/territories have introduced commercial 3GPP-compatible 5G services. In the next couple of years, 5G is expected to make substantial inroads in many countries, including India.

However, to leverage the real potential of 5G, telcos need to develop new structures that can provide continuous support for high bandwidth and low-latency applications and effectively execute their administration. This is where the Telco edge could help win big!

Evolving business needs

As 5G moves to the mainstream, Internet of Things (IoT) devices such as autonomous cars, connected appliances, and robotic processes, gain the necessary fuel to communicate and share data faster than ever. Swedish telecom equipment maker Ericsson estimates around 5 billion IoT connections by 2025, up by the existing 1 billion connections today. That’s huge! Such a spread connected network will also result in an explosion of data that could strain the existing cloud ecosystems.

The biggest challenge will be: how to manage, process, and deliver this high volume data and support low-latency based real-time applications using prevailing communication networks in a secure, reliable, and efficient way.

Telco edge enables enterprises to lessen reaction processing to milliseconds, thereby eliminating the need to transfer data to the centralized cloud. By taking cloud services and resources together, edge deployments provide benefits such as latency reduction, bandwidth scale, and mobility support, imperative for the next-Gen time-sensitive applications and services.

Edge will enable mobile network providers to move the value chain upward and unlock new revenue streams. It adopts cloud-native technologies to distribute the network infrastructure cost, just like Infrastructure-as-a-service (IaaS) offering.

Collaboration route for ample opportunity

With 5G services growth inevitable in the near future, top Indian telecom service providers, such as Reliance Jio, Bharti Airtel, and VI are also gearing up to further their edge clouds and leverage it as a new revenue opportunity. India’s service providers can take a cue from many global telcos who are aggressively building a distributed cloud approach.

While ‘edge’ may be uncharted waters for telcos to date, the year 2021 is likely to be a defining year from the telco edge deployment perspective. South Korean wireless telecommunications operator SK Telecom and Japanese Telecom operator KDDI recently launched 5G edge cloud services. American multinational telecom company, Verizon as well is exploring the potential of AI at the Edge of the network to locate and provide necessary real-time support to relevant IoT resources. Companies like Renovo, a connected car startup, and electronics giant LG are among the organizations testing telco edge services on Verizon’s network.

Many other telcos worldwide are screening the automated environments and investing in AI and machine learning capabilities to save OPEX and open-up new exciting revenue streams in the 5G networks.

However, telcos are not the only ones battling for their share in the edge computing market. Global hyperscalers such as Google, Microsoft, Facebook, and Amazon are building their edge capabilities and have their unique strengths, such as global reach and high investment potential for R&D.

The year 2021 is likely to see both Hyperscalers and mobile network operators forging strong partnerships to enable AI and Edge use cases.

 

The new WhatsApp policy has stirred up a hornet’s nest

The new WhatsApp policy has stirred up a hornet’s nest

Pavan Duggal

Dr. Pavan Duggal, Indian Cyber Law Expert

“I’m surprised that WhatsApp has done this even though India is their largest market. Effectively this means that WhatsApp, apart from sharing personal data, also discloses your transaction-associated information, which means including your credit card number, your debit card number, and your bank details. At the same time, they will share the IP address of users. It’s a very perilous situation, especially in a country that lacks a strong legal ecosystem around cyber laws and data security. Such policy changes can upsurge the probabilities of misusing users’ data by anti-social elements.  I strongly believe that people should count on more secure platforms such as Signal and Telegram for their messaging needs now.”

Gagandeep Kaur

Gagandeep Kaur, Indian telecom market observer and commentator

“This policy change will force users to re-think their use of WhatsApp. WhatsApp users need to change their usage patterns, and if possible, find other messaging platforms that have stricter data privacy policies. I’ve been using WhatsApp since its inception for virtually every aspect of my conversations. But with new integration and privacy policies, I plan to filter my conversations, particularly regarding my banking details. WhatsApp and Facebook should stop taking people for granted.”

If you are a WhatsApp user, it is quite likely that you would have seen a notification from the messaging application that it has updated its privacy policy. WhatsApp has said that it will inevitably begin sharing users’ data with Facebook in a month’s time. According to WhatsApp, all WhatsApp users need to read and accept the new terms before 8 February to continue using its services. Those who do not accept the policy will have to give up access to their accounts.

The revised policies will allow WhatsApp to share various forms of user data with the Facebook platform. What is more concerning is that the data could be accessed by multiple third-party applications that a WhatsApp user may use on Facebook.

While the cross-platform messaging solution remains end-to-end encrypted, which implies no one can access the content of WhatsApp’s messages and calls, the new policy means sharing a host of critical user information. It includes information about a user’s location, IP address, mobile operator, timezone, phone number, and receipt of a Facebook or WhatsApp account. Additionally, conversations associated with business accounts will now be shared with Facebook.

A step change

The social media giant has backtracked from its earlier stance as an advocate for user privacy. One must recall that in February 2014, at the time of WhatsApp’s acquisition, the US-based Facebook maintained that it would keep the messaging company autonomous, discarding any overlap concerns with Facebook or Messenger app.

That apart, Facebook’s past record, when it comes to user privacy, has been far from stellar. The social-media giant has often been accused of surveillance and data-mining by internet watchers.

In early 2019, data of 49 million Instagram users and 419 million Facebook users were disclosed. In 2020, another hacking scandal erupted where cybercriminals leaked personal details of 267 million Facebook users. As per media reports, the leaked database was available for sale on the Dark Web without any password for just under $600, intensifying concerns around SMS spam and phishing.

The business case for new-alternatives

Facebook-WhatsApp integration may not be brand new since WhatsApp had been in one form or the other was sharing user information throughout its corporate family. However, compared with what has happened previously, the user does not have the option of not sharing his personal data.

There is no doubt that the new WhatsApp policy will dilute users’ privacy and trigger intense debate around data security and finding new alternatives to the social messaging app.

The question is: should users search for a more secure alternative to WhatsApp? At present, there are various alternatives such as Telegram, Signal, Snapchat, and Hike, for Indian users. Telegram has an upper edge explicitly since it was developed to contest WhatsApp’s dominance and has already gained a substantial presence in the Indian market. It also claims to have the multi-data center infrastructure and encryption policies superior to WhatsApp.

“Use signal,” Tesla Founder Elon Musk had tweeted in response.

Better World has designed a quick survey, aimed at garnering a consolidated view of users’ response to the policy change announced by WhatsApp.

Please click here to take the survey. 

Your participation matters. On the survey’s completion, Better World will share the link to the report 

Deepak Kumar

Deepak Kumar, Founder Analyst and Chief Research Officer, Better World | BM Nxt

“This policy change has the potential to trigger a longer-lasting debate than being envisaged now. It raises a fundamental question: does a service provider have the right over user data just because it is being shared or stored with the platform? The ramifications could be wide and deep, and regulators will likely step in to redefine the finer contours of privacy.”

 

Jatinder Singh

Jatinder Singh, Director – Strategy and Insights, Better World | BM Nxt

“Given the history of privacy breaches faced by Facebook, it is understandable that WhatsApp users should get concerned about sharing their personal information. However, it needs to be seen if WhatsApp’s abandonment is a viable option, especially for a country that has become heavily dependent on its use. Overall, the move could cause a dent in the growth aspects of WhatsApp in India and give an opportunity for competiting messaging platforms to expand their presence in the Indian market.”

Hackers step up obfuscation attacks to break into IT networks

Hackers step up obfuscation attacks to break into IT networks

In 2020, cyber-attacks reached a new scale, disrupting the business community and Information security professionals. Malware, phishing, denial of service attacks, DNS tunneling, SQL injection, and zero-day exploits have seen a massive explosion in every large organization. According to a report from antivirus, cloud, and endpoint security firm McAfee, since 2018, the cost of global cybercrime has reached over $1 trillion. If that wasn’t enough, the industry has noticed a new pattern of cybercriminals investing in plug-and-play obfuscation software-based toolkits to infect corporate networks for financial gains. (See: Top enterprise cybersecurity trends of 2020)

Obfuscation is a proven technology widely used by security professionals and coders to make the source code anonymous and incoherent. The technique helps businesses secure their critical data and prevent hackers from using reverse engineering techniques to discover an enterprise network’s vulnerability and launch attacks.

The recent cyber intrusion in the software  IT monitoring and management software company Solarwinds was executed by an obfuscated advanced persistent threat (APT) that mysteriously took nine months to discover. (See: SolarWinds hack: CISOs need to revisit cyber resilience?)

However, as usual, hackers appear to be a step ahead of network protectors. Call it money as a motive or an innovative mindset; cybercriminals always develop enterprising ways to infiltrate defenses. Obfuscation-as-a-service is one such recently exposed illegal business model developed by cybercriminals. Professional hackers try to make money from selling such techniques on subscription-based models to other hackers.

As-a-service model for orchestrating a hack

Those who trust that the as-a-service models are currently only transforming legitimate business models will probably live on a different planet. Over the past few years, cybercrime as a service model is swiftly making inroads into the dark-web. Professional fraudsters and cybercriminals use illegal platforms to sell cyberattack tools, procedures, services, and a host of software programs to evade detection and launch fully automated cyberattacks.

Obfuscation-as-a-service model is operating on similar lines. In 2020, many instances were discovered by cybersecurity monitoring agencies and solution providers where hackers provided automated obfuscation service and android pocket kits (APKs) on a subscription basis to fraudsters. In the wake of a growing remote workforce, most organizations are introducing workplace productivity apps that can be accessed quickly by employees through their mobile phones. As such cracking mobile applications, especially android, through obfuscation has become a prime focus area for cybercriminals.

The entire business of purchasing and selling obfuscation service happens through illegitimate darknet marketplaces, making it very challenging for governments and law-enforcement authorities to keep a consistent track. This new development of obfuscation-as-a-service is perturbing for enterprises with global footprints, which have a massive amount of data located on different clouds. This unlawful cybercrime service model can give a ready-to-launch platform to even newbie cybercriminals who regularly exploit weaker networks.

What’s the remedy?

To protect networks from obfuscation techniques or deobfuscate malicious codes launched by hackers, organizations need to ensure the uppermost security level that fills the unwanted gaps. Applying integrity controls, encrypting as much as possible, transforming program codes and making them unintelligible, inserting anti-debugging logic are some of the fields that should be strengthened.

While there is no perfect solution that can give full-proof code security, a host of commercial tools can be tested and implemented to make your security architectures robust.

Most importantly, in 2021, organizations and cybersecurity leaders should set-up quality budgets to train their in-house talents and develop innovative solutions to fortify their resilience levels and mitigate new-age obfuscation security threats.

Jaspreet Singh, Partner–Cybersecurity, EY

Jaspreet Singh, Partner–Cybersecurity, EY

In Focus

Jaspreet Singh

Partner, Cybersecurity, EY 

It’s about leading the cybersecurity organization in the new normal.

The Covid-19 pandemic has ushered in a series of unprecedented shifts in global and Indian economic conditions amidst extensive industry disruptions. Over the last ten months, there has been a significant remolding of how services and products are delivered and consumed. Remote working has become a reality and, in some ways, ‘the new normal,’ while online models have primarily driven consumption of goods and services. These drastic and sudden modifications in business environments have significantly impacted the ICT  and cybersecurity priorities and investments across organizations.

Almost all enterprises have responded to this precarious situation by empowering their employees and engaging customers through remote working interventions, policies, and tools. Without a doubt, this response has been brisk and useful to an extent and has brought to light chinks in many an organization’s armors in the realm of cybersecurity.

Coupled with an insurmountable surge in the volume and sophistication of cyberattacks in the last two quarters, India’s CISO community had to move ahead with a steely resolve to address these challenges. (See: How COVID-19 has changed cybersecurity focus for 2021)

Jaspreet Singh, Partner–Cybersecurity at EY, outlines the top challenges faced by the CISOs in India in the wake of the Covid-19 pandemic. He also shares best practices that organizations could embrace to steer them through the complex maze of cybersecurity issues and help them firm up their cybersecurity posture.

Essential, and yet troublesome—thy name is remote working.

Covid-19 is creating a global ‘work from home’ culture, as organizations see employees working from home as a feasible long-term option if regulatory issues can be addressed.

However, cybercriminals are using it as a massive opportunity as people are often connected to the corporate network through their home Wi-Fi connections, which are not secure due to weak router configurations or multiple poorly protected IoT devices connected to the same network (among other things).

Cybercriminals are also using this time of great fear to target people with phishing attacks using coronavirus themes. Cybercriminals are also leveraging and targeting video communication platforms for hijacking teleconferences, and we have also found maze ransomware targeting managed IT, service providers, on a global scale.

Adapting to the new normal is the biggest challenge for the CISO.

Today’s enterprises need to secure access to their organizational resources, regardless of the user or application environment. This means that the biggest challenge is about adapting to the modern distributed workplace and embracing a mobile workforce while protecting people, devices, and data, irrespective of their locations. (See: Here’s how the new Cyber Security Policy could reshape CISO roles)

Addressing the remote working conundrum—in search of a feasible and effective intervention

It is highly critical for organizations to review their cybersecurity strategies given the global pandemic and follow their renewed realization of IT dependence. IT teams are organizational warriors who have worked day and night and played a crucial role in helping most organizations adapt to the work-from-home culture.

The initial focus of all organizations has been on enabling work from home in the fastest possible time, due to which security was not kept on priority. This resulted in a major risk.

Cybersecurity also needs to align itself to see through risks to the organization—its people, processes, and technologies. The organization would have to align its cybersecurity strategy to changing IT strategies and investments.

Post the pandemic, the cybersecurity organization is slated to undergo a drastic transformation.

The cybersecurity industry will see a sharp increase in the demand for adapting to technological solutions for remote working and security solutions to reduce risks to the IT infrastructure.

The cybersecurity skills shortage will also worsen as these skills would be necessary to protect the IT infrastructure and address the likely increase in cybersecurity compliance.

Never trust, always verify—‘zero trust’ as a critical component of the cybersecurity system for Indian organizations. 

Zero trust teaches to “never trust, always verify.” It has a significant role in how people access organizational resources, regardless of where the request originates from or what resources one accesses.

Jaspreet Singh, PartnerCybersecurity, EY

With 17 years of rich industry experience, Jaspreet owns the P&L of Cybersecurity for North India at EY. He advises organizations across telecom, tech, media, and entertainment sectors, and has been instrumental in helping them become cyber-ready businesses of the future.

Over the years, his advisory and evaluation skills have helped many businesses progress through the cybersecurity value chain.

He also shares the additional responsibility of developing the cybersecurity practice in Bangladesh and the Middle East for EY.

Expertise

  • Data privacy
  • IT security and governance
  • IT strategy
  • IT program management
  • IT attestation services
  • Datacenter security
  • Network security
  • Risk assessment and management
  • Business continuity planning and crisis management
  • Ethical hacking

Honors and awards

  • Chairman Value Award, 2014
  • Consultant of the year, Cybersecurity, 2017

It is not about users being un-trustworthy; instead, it is about firmly authenticating, authorizing, and inspecting all traffic flows always to ensure that malware and attacks don’t sneak in accidentally or maliciously.

Many organizations are knowingly or unknowingly following, in principle, the ‘zero trust architecture.’ However, moving to a complete ‘zero trust’ architecture will take time. Organizations need to mature to a level starting with strong authentication in general.

It will be essential to consider each investment carefully and align it with current business needs. Fortunately, each step forward will make a difference in reducing the cybersecurity risk and returning trust in the entirety of your IT Infrastructure.

Aim to build resilience across the value chain.

You must be prepared to deal with the attack. You have to be able to investigate the incident quickly, make smart decisions, and take actions immediately.” Effective resilience programs look not only at the infrastructure within the four walls of the organization but also look to consider the impacts of customers, vendors, partners, and other participants across the value chain.

*The article was originally published as part of a Better World–Microfocus Coffee Table Book initiative titled Accelerating Enterprise Innovations. You can read the e-Book by clicking here.

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Join to get the latest updates from Better World.

You have Successfully Subscribed!