Lose battles, but win the war - devising a grand strategy for Security

Cyber attacks are more often the norm for global enterprises now than you realize.  According to Thales, 67 percent have already experienced some kind of breach, so the realization is that it's not "if" you will be hacked but more of a question of "when". 

To lose some battles against the hackers might be inevitable but with the right approach in place, you may find that next time, you win.

You might be quick to think that the best security lies in a fortress of external perimeter firewalls, internet proxy services, and gateways will keep the attackers out. But although common, this is a fundamentally flawed approach. 

Once a hacker knows their way around these defenses, you could be prone to further attacks so a different perspective on protecting your valued data is needed.  Here are some vital considerations when planning your strategy for security.

Clouds on the Horizon

The enterprise has embraced the cloud and cloud services have proliferated in the last few years. Of the enterprises that have a multi-cloud strategy today, according to Fujitsu’s– State of Orchestration 2018/19 report, 95 percent find managing Cloud Security their biggest challenge.

It’s not unusual for an enterprise to be working with 20 different cloud providers. Businesses and their end users are typically using hundreds of cloud services at any given moment. This all adds up to a massive potential for data leakage, for data loss, and for regulatory compliance issues.

Cloud services are often adopted directly by business units now, so resilience and business continuity may not have been given the consideration they’re due. Many organizations are also exposing internal data through their APIs which could be providing business competitors with valuable insights that can be used to dull your competitive edge.

A proper assessment of your potential business risk requires a broad interrogation of your cloud adoption, backed up by comprehensive protection at the edge, where people connect.

Detecting Data Leakage

Just as sensitive business data may be exposed by multi-cloud environments, personal data is increasingly at risk through social media. When data gets into the wrong hands it represents a serious threat to your security.

You can’t take it for granted that your data isn’t out there. Just because you haven’t detected a breach doesn’t mean that it doesn’t exist, after all, most breaches are several weeks old before they’re detected.

Run some business risk cyber-threat analysis tools against your company name. Search for sensitive data, whether it’s secret code names, individuals' names, your CEO's address, certain credit card numbers, account numbers, or maybe even entire paragraphs, pages or pictures in documents.

You must ensure that this information is not available outside your organization, possibly even for sale on the Dark Web.

You don’t want to find anything, but if it’s out there it’s far better to know. This way you can act to protect your customers, prevent further leaks and trace possible gaps in your defenses. Proactive insight enables you to safeguard your business reputation and maintain trust and confidence.

Consider Your Partners

It’s vital to apply the same scrutiny to your rapidly growing ecosystem of partners and cloud services as you do to your own organization. If you don’t carefully manage this complexity and achieve a high level of oversight, then you run a very real risk of fines for non-compliance.

Your customers are no more likely to apportion blame to a third-party partner than the regulators, so you can add reputational damage to the threat list.

Working with start-ups and other digital partners is crucial to drive innovation but perform due diligence and pick partners that are compliant, trustworthy and ISO-certified at the level you need.

If new partners with less mature security strategies have access to your environment, then hackers will view them as low hanging fruit and use them as a backdoor in. You need real visibility and control to provide secure contextualized access for remote workers and third-parties.

Artificial Intelligence and Automation

Finding threats and dealing with them swiftly and effectively is key. Within minutes of setting up a server with an open port nowadays, there are going to be exploitation attempts. Automated defenses to flag problems and close gaps are one of the best ways to nullify the threat.

Employ AI and behavioral analytics to scan for patterns and identify anomalies and suspicious traffic. If something is out of the ordinary, you can shut it down automatically with the right, properly configured tools, effectively slamming that door shut before the attacker gets in.

Real-time monitoring that encompasses analysis of data movement and traffic patterns, combined with micro-segmentation of your network, can prove very effective.

Security is a war that’s continually raging, and you will lose the odd battle, but a grand strategy looks beyond that at the bigger picture, planning ahead and plotting a course for a more secure future.