Intelligent CISO Issue 70 | Page 37

f

e

a

t

u

r

e

A hyperconnected world is the new normal for most businesses , but the rapid adoption of technology continues to increase the number of vulnerable entry points in many organisations .

The rise of remote working has been a significant catalyst leading to two years of rapid Digital Transformation , but inefficient security measures and rushed policies can hinder early detection and fast response capabilities .
In September 2023 , the National Cyber Security Centre published a report observing a recordbreaking number of attacks between September 2022 and August 2023 – an increase of 153 %, and suggesting ransomware activity would persist into 2024 . The appropriate security solutions will protect and defend ; mitigating threats as well as empowering businesses with recovery tools from ransomware attacks .
Dave Adamson , CTO of Espria
How then , should companies go about securing their software and data ?
Digital Transformation has transformed the attack surface
Dave Adamson , CTO of Espria , tells us how business leaders must rethink their strategies to succeed in the midst of a ransomware pandemic .
Data and digital tools that were previously centralised on-site , with a protected network of firewalls and device log analysis , now live on the cloud . With the rapid change to a hybrid / remote work culture , businesses have understandably focused on integrating new products into their companies , but necessary security standards and governance often lag behind , meaning businesses are left unable to monitor activity and manage their networks effectively .
Most companies have integrated SaaS tools and cloud storage to allow remote workers access to services , but new architecture means more opportunities for ransomware attacks .
Businesses need hardened internal controls for data access and management such as Identity and Access Management ( IAM ), Privilege Access Management systems ( PAM ) and multifactor authentication ( MFA ) to protect business assets . Limiting the number of users with access to certain functions increases system security while allowing businesses to control and isolate risks , and manage access to high-risk data .
WWW . INTELLIGENTCISO . COM 37