Cyber-Security at a Glance
Information is the corner stone of any organization, and cyber-security is the process that protects that information. Cyber attackers are everywhere and now with digital transformation, the entire world is prone to different cyber-attacks. To get the organization’s important information, the attackers will always try to enter into GeBBS devices to get access to our sensitive data.
If you are working online, cyber-security
has a direct impact on you. And with rapid innovations taking place across the
globe, it is more relevant than ever. Looking at this scenario, the most
important job for me and my team is to protect our organization’s data from any
kind of cyber-attacks and keep our information secure. Since you all know that
confidentiality, integrity, and availability plays a major role in information
security, I believe that cyber-security is everybody’s job.
So, what are the different cyber-security
threats?
Some of the most common threats are malware
and phishing scams. Malware is a broad category of cyber-attacks that refers to
any software carrying out predatory threats. It tends to run in the background
of unauthorized programs and includes several types of attacks. For example,
ransomware will target or disable a device until the user pays a monetary
ransom.
I am sure that you must be aware of phishing
scams, which are also popular cyber-attacks. Here, a scammer contacts an
unsuspecting individual or company before attempting to gather sensitive data
from the target. This often happens via email, but it can also occur over the
phone, through text message, or via social media applications.
With the rise of smart technology, from
smart container ships to smart homes and security cameras, everybody is taking
cyber vulnerabilities seriously. We are no different. At GeBBS we have7 layers
of security architecture to protect our critical assets and networks. This is a
single software or strategy that makes our organization secure.
1st layer is ‘Mission Critical
Assets’ – All data needs to be protected. Again, remember that every data does
not require equal level of protection. Identifying the kinds of data that exist,
categorizing that which is mission-critical, and centering the security program around that, is a smart first step towards a more secure
organization.
2nd layer is ‘Data Security’ –
Data security controls to protect the storage and transfer of data.
3rd layer is ‘Application
Security’ – Application’s security controls access to an application, and the application’s
access to mission-critical assets, while ensuring the internal security of the
application.
4th layer is ‘Endpoint Security’
– Endpoint security controls protect the connection between devices and the
network.
5th layer is ‘Network Security’
– Network security controls protect our organization’s network and prevent
unauthorized access of the network.
6th layer is ‘Perimeter Security’
– Perimeter security controls include both the physical and digital security
methodologies that protect the overall business.
7th layer is ‘The Human Layer’ –
Humans are the weakest link in any cyber-security chain. Human security
controls include phishing simulations and access management controls that
protect mission-critical assets from a wide variety of human threats, including
cyber-criminals, malicious insiders, and negligent users.
The outbreak of the coronavirus across the
world has had long-lasting impacts on cyber-security and the layers of security
protection. In fact, a recent analysis of the Barracuda report found that 46% of
all companies have reported a cyber-security incident following the outbreak of
COVID-19 and the subsequent lockdown.
There are a number of factors leading to these numbers:
- Rapid remote deployments
- Reliance on digital communication
- Disruption to security processes
- Varied risks in remote environments
- Shift to cloud-based infrastructures
Hence, as an Information Technology & Security leader,
I ensure to build a holistic model that uses all the 7 layers of security to
protect mission-critical assets in our organization. As we get ourselves future
ready, we also have to develop our skills to protect ourselves from cyber-attacks.
Remember, Information Security is everyone’s
responsibility.
Comments
Post a Comment