Intelligent CISO Issue 23 | Page 46

industry unlocked response communications, meaning that the consequences of a breach are substantial. Steps must be taken to ensure that every blunt edge in telecoms cybersecurity is sharpened and secured. Guarding assets with Privileged Access Management Companies today look after a whole host of information and data, much of it being confidential and of critical importance. To guard this data yet still allow certain individuals to access it, privileged credentials exist across almost every enterprise’s IT environment. Cybercriminals know this. That is why almost all advanced attacks today gain access to a target’s most sensitive data, applications and infrastructure by exploiting a company’s privileged credentials. Telecommunications is by no means an exception. Despite this knowledge, organisations allow privileged access to critical assets and systems to remain unsecured and unmanaged. Assets are therefore left vulnerable to damaging cyberattacks that could impact telecommunications companies and citizens far beyond the limits of a simple data breach. Companies must Telecoms companies are frequently targeted because they build, control and operate critical infrastructure that is widely used to communicate and store large amounts of sensitive data up their game in securing, controlling and monitoring the use of powerful privileged accounts to minimise disruptive damage to these systems. In order to proactively reduce the risk of privileged access abuse, telecoms companies must first understand the most common types of attacks that exploit privileged access. They must know how an attacker thinks and behaves in each case to exploit the organisation’s vulnerabilities. They must then prioritise the most important privileged accounts, credentials and secrets. Identifying the potential points of attack and then focusing especially on those that could jeopardise critical infrastructure or the organisation’s most vital information, is also essential. After understanding weaknesses and access points for attackers, telecoms companies must determine the most effective actions to close the gap in these areas. Which actions are the highest priority? What can be achieved quickly and which actions require a long-term plan? As an overarching rule, organisations should recognise that attackers are constantly looking for new ways to gain access and act appropriately in response. By taking the time to plan out a strategy for managing privileged access and returning to reassess it as your organisation and the threat landscape evolve, you can develop a formidable defence. Securing telecommunications’ exciting future As a global society, we’re moving into an era where technology is our most important asset and tool. We are innovating the very networks that this world runs on daily, creating, in turn, services that improve our standard of living exponentially. IoT devices create a network of tools that are versatile and agile for human needs and 5G connectivity will provide all of it at our fingertips. But as a shepherd tends his flock at night, so must we in keeping alert and vigilant to potential threats that attempt to disrupt positive growth. By understanding threats, proactively prioritising the weakest points in privileged access infrastructure, determining the best course of action and striving for continuous improvement, CSPs will be able to minimise damage from cyberthreats. With a solid strategy in place, the rewards of a hyper- connected world will be reaped. u 46 Issue 23 | www.intelligentciso.com