FEATURE
Zero Trust combined
with strict access
control is critical.
and devices, Zero Trust combined with
strict access control is critical. To better
secure those network environments
even further, security teams must also
introduce two-factor authentication
and implement dynamic network
segmentation to limit who sees what
while also carefully monitoring devices.
3. Stay up-to-date on privacy laws
Massive penalties await those who
violate the EU’s strict data protection
regulations (GDPR). With new privacy
laws on the books across the globe,
including California’s new California
Consumer Privacy Act which went into
effect on January 1, 2020, it can be
easy to go astray. Organisations should
look for security tools that will offer
guidance on remaining compliant amid
digital innovation.
4. Monitoring web presence
As cybercriminals continue to target
vulnerable websites, security teams must
take additional steps to ensure their
websites and web applications are able
to stand up against these threats. This
includes securing SaaS apps, deploying
web app firewalls and implementing
Cloud Access Security Broker (CASB)
solutions and endpoint security tools for
mobile users. Organisations should also
only choose solutions that are designed
to function as an integrated system for
seamless coverage and no security gaps.
5. Securing apps
Software developers who build the
apps used across organisations do not
always prioritise security, especially
in third-party apps that are typically
installed on personal devices. For these
types of apps, organisations should
deploy endpoint security tools, while
38 Issue 24 | www.intelligentciso.com