Page 7 - AeM_June_2019
P. 7

RESEARCH, ANALYSIS & TRENDS




           authentication,   segmenting   your    network      duction of the General Data Protection Regulation
           environment,  and  enforcing  ‘least  privilege’  and   (GDPR)  which  came  into  effect  in  Europe  in  May
           segregation  of  duties.  Other  recommendations    2018.  This  caused  a  stir  globally  regarding  data
           include  implementing  network  activity  monitoring   protection  principles  and  personal  privacy  rights.
           and data loss prevention, as well as educating your   Subsequently,  a  number  of  other  countries  have
           employees to be vigilant about phishing attacks.    implemented  new  data  protection  regulations  or
                                                               are  ‘beefing  up’  their  existing  compliance
        •  Web-based  attacks  aren’t  new  and  have  been    frameworks   and   regimes.   Data   protection
           frequently  o-rved  for  some  years.  Dimension  Data,   principles  and  personal  privacy  rights  should  put
           however,  has  seen  an  alarming  increase  in  recent   cybersecurity  firmly  on  the  boardroom  agenda.
           cyberattacks in this area. In fact, they doubled year-  Dimension  Data  recommends  ensuring  that
           on-year, accounting for 32% of all attacks detected   executives understand how cybersecurity and data
           during  2018,  representing  the  top  type  of  hostile   protection can deliver (or, if ignored, can potentially
           activity.  Web-based  attacks  target  web-application   erode) tangible business value. This will gain their
           and    application-specific   vulnerabilities   in   attention  and  help  secure  the  appropriate
           technologies  frequently  used  by  many  businesses.   investment  and  drive  a  top-down  focus  on
           Any  organization  that  has  a  web  presence  is   changing the behaviors and culture throughout the
           exposed  to  these  attacks:  the  larger  their  web   organization regarding these issues.
           presence,   the   greater   the   attack   surface.
           Compounding  the  challenge  is  that  today,  more  While the threat landscape will continue to evolve, and
           companies’  applications  are  being  housed  in  the  the   emergence   of   new,   more   sophisticated
           cloud which exposes the organization to new attack  vulnerabilities  and  attack  vectors  is  inevitable,  we
           types.  Dimension  Data’s  advice  to  help  protect  should  constantly  prepare  for  fighting  cybercrime.
           yourself from web-based attacks includes prioritizing  Keeping  an  eye  on  and  investing  in  cybersecurity
           patching,  segmenting  your  network  environment,  innovations  will ensure  that  you remain agile and that
           and  enforcing  secure  coding  practices.  Also  your  business  is  geared  to  adapt  to  the  ever-evolving
           consider  deploying  application-aware  firewalls  and  threat  landscape. But  bear in mind  that  you’ll need to
           performing regular vulnerability scanning.      adapt and change your mindset as well: security must
                                                           be embedded into the business’ strategy upfront, not as
        •  Regulatory  compliance  is  a  well-known  IT  risk  an afterthought. (Source: Dimension Data) ◊
           management     challenge   faced   by    many
           organizations. Last year, data protection and privacy                             By MediaBUZZ
           dominated  media  headlines,  spurred  by  the  intro-






































                                                 MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   2   3   4   5   6   7   8   9   10   11   12