W88bet Diễn đàn W88bet

Cộng đồng w88bet, nơi chia sẽ kinh nghiệm chơi w88bet.

You are not logged in.

#1 2020-08-13 13:11:40

AAAAgmailcom
Member
Registered: 2020-08-12
Posts: 2,127

In a 2016 Syntonic survey of C-level executives

Cybersecurity is a 24/7, multi-front commitment.
It’s no longer enough to assume the presence of a traditional, well-defined network that’s defensible from attack during normal business hours, since today’s teams can operate anytime and anywhere, often from the devices of their choice.
The entire notion of a network perimeter has accordingly fractured along several fault lines:  Mobile endpoints enable easy access to key company resources.
In a 2016 Syntonic survey of C-level executives, 68 percent of respondents reported their employees spent four of more hours weekly using smartphones for business purposes.
Cloud computing has lessened companies’ direct control over compute, storage and networking resources.
The 2018 Spiceworks State of IT report found cloud/hosted services accounted for 21 percent of the typical IT budget, nearly even with software.
Popular communication options, including instant messaging and video conferencing, are essential for modern collaboration, yet they also expand the attack surface.
Phishing and surveillance frequently exploit widespread reliance on these tools.
Security strategy must address these challenges head-on.
In this three-part series, we will look at the different bases organizations now have to cover in ensuring information security, starting with their personnel.
Some degree of human error is unavoidable, but the associated risks can be mitigated by conducting useful trainings, getting buy-in from leadership and eliminating organizational silos.

Security awareness training: Everyone must be involved For cyberattackers

enticing someone into clicking a suspicious link or entering his or her credentials into an unsecured form is much easier than bypassing advanced defenses.

A 2018 Microsoft report even identified email phishing as the most common attack type

Since such threats can target anyone, security awareness training must span the entire company, from the board to the front desk.
Effective training should go beyond just viewing slides with harrowing statistics on them.

It should include:  Simulations of phishing and other attacks

like social engineering.
Options for remedial courses for anyone struggling to avoid these risks.
Follow-up tests and peer-based collaboration to keep everyone current.
These features help reduce the dangers from attack vectors targeting people, in turn mitigating risk to the sensitive information they work with.
Executive buy-in: An uphill struggle worth winning Despite the clear evidence of the costs of security breaches – the Ponemon Institute has estimated a $3.62 million price tag for the average incident – it’s not always easy to convince leadership to invest in cybersecurity training and technical solutions.
Cost is not the only issue, either.
Executives might regard the time needed to rethink security strategy as secondary to other priorities, especially in today’s complex threat landscape.
“Security awareness training must span the entire company.”  Overcoming this mentality often requires presenting cybersecurity as an essential business function, such as accounting or logistics, instead of as something walled-off from everything else.
Technical security jargon and acronyms, while important in some contexts, .

Should probably be shelved when making a direct case to the C-suite

Clear metrics and visuals can also help, along with internal or external security audits.
The 2018 Internal Audit and Capabilities and Needs Survey from Protiviti found cybersecurity had become one of the top eight audit priorities, along with cloud computing.
Silos: How removing them promotes stronger security Cybersecurity affects everyone in the organization.
However, attempts at getting all teams onboard with security education and updates can quickly stall because of organizational silos, which isolate decision-making, impede communication and result in inefficiently duplicated (or even conflicting) workflows.

An entire movement in the software world

called DevOps, emerged to confront these challenges and became one of the defining IT trends of the early 2010s.
Similar cross-functional collaboration is necessary for comprehensive coverage against security threats.
Sales, marketing, HR, legal: Every department needs to be on the same page when it comes to upholding best practices for data protection.
In the next part of this series, we will look at the role of governance processes in information security.
Be sure to take a look at our Services page for additional background on how Inspirage can help you modernize your infrastructure and processes.
.

Offline

Board footer

Powered by FluxBB