Cyber-Security at a Glance

 



Information is the corner stone of any organization, and cyber-security is the process that protects that information. Cyber attackers are everywhere and now with digital transformation, the entire world is prone to different cyber-attacks. To get the organization’s important information, the attackers will always try to enter into GeBBS devices to get access to our sensitive data.

If you are working online, cyber-security has a direct impact on you. And with rapid innovations taking place across the globe, it is more relevant than ever. Looking at this scenario, the most important job for me and my team is to protect our organization’s data from any kind of cyber-attacks and keep our information secure. Since you all know that confidentiality, integrity, and availability plays a major role in information security, I believe that cyber-security is everybody’s job.

So, what are the different cyber-security threats?

Some of the most common threats are malware and phishing scams. Malware is a broad category of cyber-attacks that refers to any software carrying out predatory threats. It tends to run in the background of unauthorized programs and includes several types of attacks. For example, ransomware will target or disable a device until the user pays a monetary ransom.

I am sure that you must be aware of phishing scams, which are also popular cyber-attacks. Here, a scammer contacts an unsuspecting individual or company before attempting to gather sensitive data from the target. This often happens via email, but it can also occur over the phone, through text message, or via social media applications.

With the rise of smart technology, from smart container ships to smart homes and security cameras, everybody is taking cyber vulnerabilities seriously. We are no different. At GeBBS we have7 layers of security architecture to protect our critical assets and networks. This is a single software or strategy that makes our organization secure. 

1st layer is ‘Mission Critical Assets’ – All data needs to be protected. Again, remember that every data does not require equal level of protection. Identifying the kinds of data that exist, categorizing that which is mission-critical, and centering the security program around that, is a smart first step towards a more secure organization.

2nd layer is ‘Data Security’ – Data security controls to protect the storage and transfer of data.

3rd layer is ‘Application Security’ – Application’s security controls access to an application, and the application’s access to mission-critical assets, while ensuring the internal security of the application.

4th layer is ‘Endpoint Security’ – Endpoint security controls protect the connection between devices and the network.

5th layer is ‘Network Security’ – Network security controls protect our organization’s network and prevent unauthorized access of the network.

6th layer is ‘Perimeter Security’ – Perimeter security controls include both the physical and digital security methodologies that protect the overall business.

7th layer is ‘The Human Layer’ – Humans are the weakest link in any cyber-security chain. Human security controls include phishing simulations and access management controls that protect mission-critical assets from a wide variety of human threats, including cyber-criminals, malicious insiders, and negligent users.

The outbreak of the coronavirus across the world has had long-lasting impacts on cyber-security and the layers of security protection. In fact, a recent analysis of the Barracuda report found that 46% of all companies have reported a cyber-security incident following the outbreak of COVID-19 and the subsequent lockdown.

There are a number of factors leading to these numbers:

  • Rapid remote deployments
  • Reliance on digital communication
  • Disruption to security processes
  • Varied risks in remote environments
  • Shift to cloud-based infrastructures

Hence, as an Information Technology & Security leader, I ensure to build a holistic model that uses all the 7 layers of security to protect mission-critical assets in our organization. As we get ourselves future ready, we also have to develop our skills to protect ourselves from cyber-attacks.

Remember, Information Security is everyone’s responsibility.

Comments

Popular posts from this blog

Leadership Series | Leading through change

Manage your energy | Keshav Kumar Mishra

Managing in an anxious world