Evolving Security Threats and Remapping the Security scape

1st July 2019 | By Mouseworld Now Correspondent |

By Shibu Paul, VP — International Sales, Array Networks

Shibu Paul VP -- International Sales Array Networks

Shibu Paul,
VP — International Sales,
Array Networks

In an increasingly connected modern world, the risk of a cyber security threat is very high. With over 20 billion devices connected worldwide through internal as well as external networks, there is a greater chance of exploitation by hackers. We are in need of a defense system capable of identifying, detecting, protecting, responding and recovering data for neutralizing the threat.

Security threats come in different manners ranging from a simple computer virus to malicious spyware which monitors our online activities and gathers valuable personal data without user consent. Not to mention the hackers, Trojan horse software, Phishing scams and Spam mails targeted to steal sensitive financial as well as personal information. All in all it’s a battle ground laid with deadly mines and the users have to tread lightly. The annual cost of cybercrime damages is expected to hit $6 trillion by 2021 (Source: Cyber Security Ventures).
Cyber Security Trends

Digital Transformation brings about a critical point in development where enterprises are required to embrace change and leverage disruptive technologies in ways which provides them with competitive advantage. The biggest challenge at hand is to effectively manage the data coming from IOT, Analytics, AI and Robotics. Privacy and personal data protection will take precedence this year. Security testing will become part of app development lifecycle and emerging trends will gain momentum. Blockchain will become mainstream for its data theft and fraud prevention features.
Cloud Security Landscape

• 83% Of Enterprise Workloads Will Be In The Cloud By 2020 (Source: Forbes)

Cloud computing has fuelled Digital Transformation and has enabled Big Data to store and fetch huge amount of information. This de facto platform not only reduces cost and turnaround time but also increases agility and efficiency to commence new services and expand infrastructure. Even though third party cloud services play a compelling role in providing robust security measures, the organizations themselves can secure how they use the cloud and protect their own data on public or private cloud platforms. The absence of physical control, or designated entry and egress points, lead to security issues such as data leakage or deletion, unauthorized copying and backups etc. Outdated security measures, lack of trained security personnel, misconfiguration of cloud platforms, privileged user abuse are some of the areas which pose the biggest threat to cloud security

Endpoint Management
Cyber threats are ever-evolving and our traditional signature based anti-virus solutions are ill equipped to cope with them. With the proliferation of end-points, we see a reduction in productivity triggered by a possibility of corruption from unknown or unwanted applications. Besides keeping track of the increasing number of endpoints, the enterprises are required to integrate, manage and secure the endpoints, and also be compliant to data privacy regulations.

Some of the recommended best practices are:

Securing data through encryption
Developing a robust cryptographic algorithm suitable for current industry standards, using high speed cryptographic processors with appropriate offloading and acceleration can help to avoid bottlenecks and add an extra layer of security. Implement DLP (Data Loss Prevention) strategies which monitor, detect and block information leaks through ransomware, phishing and more. Providers also offer a range of security tools such as access management system and firewalls that are compatible with domestic monitoring services.

User security and identity protection
Implementing a Multi-factor authentication system with an on-demand time-based authorization to increase tamper protection and provide continuous scrutiny of API users to protect against hackers. Providing limited time authorization for crucial assignments and ensuring that the user is who he claims to be. Combining Password or a unique pin or OTP or token with biometrics during login is the most secure way for authenticating data access.

Regulatory compliance
By ensuring access to only authorized personnel, we can consistently manage security policies and retain control of the data and ensure conformance to regulatory compliance requirements. Ensure that the third party service provider is compliant and provides an unbiased cloud assessment capable of steadily tracking policy violations, user errors and misconfigurations.

Shared responsibility for cyber security
Evaluate the vendor’s security and privacy policies including data protection, vulnerability management, incident response, tamper protection and privacy.

Security measures should be integrated during project inception and not as an afterthought for comprehensive protection. It is high time for enterprises to implement cyber security protocols, industry-leading best practices and strong governance so that they are able to mitigate and recover from attacks. Small business owners take the greatest toll when it comes to cyber-attacks. It is estimated that 43% of cyber-attacks are targeted at small businesses (Source: Small Business Trends). 95% cyber security breaches have been attributed to human error (Source: Cybint Solutions). Majority of the incidents are inadvertent and unintentional stemming from lax cyber security practices.
Security is to be a part of the emerging work culture, in-built into the operations rather than an afterthought.

With careful planning and investment in secure IT culture and practices, we can contemplate a sustainable future for Digital Transformation. Remember, an organization’s cyber security is only as strong as the organization’s ability to manage it.


(Author Bio: Shibu Paul is VP – International Sales at Array Networks. Shibu has 25 years of experience in the field of Digital transformation – IT, IS and telecom.  Before joining Array, he had remarkable stints with various Tecchnology companies including Sify Ltd, British Telecom Global services (India) and BT Americas in various roles. He was part of the team that launched the first IP network, first private ISP and first Certifying Authority in India.

After joining Array in 2009 as country sales head, he progressed to leadership positions including Country Manager and Regional Director-APAC.  In his current role, he is instrumental in driving the business for Array in the region, and setting up end-to-end operations including a strong channel, robust technical team, and solid support infrastructure for Array customers worldwide.)
DISCLAIMER: The views expressed here solely belongs to the author and do not necessarily reflect that of Mouseworld Now. Mouseworld Now does not own responsibility for the views expressed here.

Tags: , , , , , , , , , , , , , , ,

Leave your comment

IMPORTANT! To be able to proceed, you need to solve the following simple math

What is 15 + 8 ?
Please leave these two fields as-is:

Mouseworldnow Videos
  • r chandrashekhar president nasscom
  • Anant Maheshwari, President, Microsoft India
  • Suresh_Vaswani-220 by 220

Channel News

  • CRG Solutions Named SingleStore’s Value-Added Reseller Partner more...
  • Vijay Sales Announces Big New Year Discounts on iPhones on its eCommerce Platform more...
  • Capillary Technologies Attains AWS Retail Competency Status more...
  • MG Motor Opens its first digital car-less showroom, MG Digital Studio more...
  • Globus Infocom to Participate in InfoComm India 2019 Expo more...
Zebronics Zeb-County Bluetooth Speaker
Cosmic Byte GS410 Headphones with Mic and for PS4, Xbox One, Laptop, PC, iPhone and Android Phones
Subscribe via email

Enter your email address:

What does the mouse ask?

Will the spurt in online video advertisement steal the twinkle from the TV ad platform?

View Results

Loading ... Loading ...
Newsletter Registration