Intelligent CISO Issue 39 | Page 28

Basic issues around phishing and poor patching remain the most popular methods of exploiting weak points when it comes to the integrity of business systems . vigilance remains key . The best network security in the world means little if employees are not informed about the latest cyberattack trends .
editor ’ s question

?

s digital technologies

A evolve and companies across the Middle East and Africa ( MEA ) more readily embrace cloud computing and the associated benefits , so too are threat actors becoming more advanced and persistent in their attacks .

Take the prevalence of malware as an example . While the tools used to exploit weak points in the network might become more sophisticated , the fundamental premise still holds true – basic issues around phishing and poor patching remain the most popular methods of exploiting weak points when it comes to the integrity of business systems .
This is as much a human challenge as it is a technical one to solve . Constant

Basic issues around phishing and poor patching remain the most popular methods of exploiting weak points when it comes to the integrity of business systems . vigilance remains key . The best network security in the world means little if employees are not informed about the latest cyberattack trends .

And with so many companies relying on the cloud for data analysis and collaboration , any weakness in network security can result in farreaching compromises that impact the business bottom line as well as the organisation ’ s reputation . There is no universal cybersecurity strategy that works for every organisation so each company must design a network security framework that suits its specific requirements and risk appetite , and reflects the overall digital readiness of the business .
An effective network strategy starts by carefully assessing the systems and processes already in place and
JAMES HENNAH , DIRECTOR , SECURITY , BT , ASIA MIDDLE EAST AND AFRICA identifying their weak points . Frequent audits become critical to ensure all these systems are running optimally .
Managed firewalls , malware protection and Business Continuity solutions form vital components of a network security strategy . Part of this will also include ongoing employee education , especially when it comes to social engineeringbased attacks .
If the organisation stays up to date with emerging cyberthreats , it can take the appropriate steps to future-proof its network security strategy . This could include frequent pressure testing of potential weak points and the building and maintenance of a cybersecurity maturity matrix . This includes things such as how advanced and secure the technology stack is , how robust the password processes of the company are and the preparedness levels of staff to deal with cybersecurity threats .
That said , network security can encompass any number of tools , devices and solutions . From access control all the way through to behavioural analytics , the environment is complex .
Selecting the best tools depends as much on the type of business as it does on its level of cloud access , employee education and solutions already in place .
Managed security services offer an excellent option for organisations who want to benefit from a holistic view of vendors and the security ecosystem as a whole .
28 www . intelligentciso . com