Intelligent CISO Issue 22 | Page 46

industry unlocked Setting up your own password-controlled Wi-Fi on site rather than logging into other parties’ networks can also help you limit the potential risks to which you are exposed. There are solutions that combine easy to manage Firewall and Wi-Fi and can be deployed within minutes, even by untrained personnel. Advanced email and web filtering should be required on all business networks. The number one distribution vector for malware, even in 2019, has been malicious email. This can not only prevent employees from accessing inappropriate content at work, but also restrict access to potentially harmful websites. Advanced Threat Detection functionality (ATD) should scan all email attachments and links before they reach the user. Email protection and Advanced Threat protection are typically outside the realm of smaller devices protecting remote sites or heavy machinery. To apply the same consistent levels of protection, a public cloud-based service scales across thousands of sites and hundreds of thousands of users with a single unified control panel. 46 All technical achievements aside, simple human error can render any investment in cybersecurity useless. It is therefore important to define, communicate, train and test robust policies to ensure that everyone in your organisation follows best security practices. In today’s cybersecurity arms race, it’s virtually impossible to guarantee immunity, but it is possible to drastically reduce your risks and make recovery as seamless as possible by automating backup and restoring functionality for your data. Are there any trends or future trends that CISOs working in the sector should prepare for? Don’t neglect the public cloud and don’t be shy seeking expertise from the outside. Much like the future building owners don’t do the actual work themselves but contract out to specialists – you make use of the expertise of security service providers. This might go hand-in- hand with deploying new public cloud-based infrastructures. u Define, communicate, train and test robust policies to ensure that everyone in your organisation follows best security practices. Issue 22 | www.intelligentciso.com