Biting the silver bullet: Protecting corporate assets

Share this article:
Biting the silver bullet: Protecting corporate assets
Biting the silver bullet: Protecting corporate assets

Security technology investment is no guarantee of protection against the latest threats. Recent studies by the Ponemon Institute indicate that despite serious business investment in equipment, there was still a 58 percent year-on-year increase in malware incidents, with the average cost of a cyber attack incurring a massive $6.1 million penalty.

In order to truly improve data security, every business must first consider a few key things: What are you protecting? What is it worth to you? What are you protecting it against? And what are the consequences of failure? These questions also need to be asked repeatedly and regularly – the shifting demands of employees, customers and other stakeholders together with evolving compliance standards cannot be resolved by point products alone, however sophisticated.

The modern data security challenge is made even more complex by employees accessing company resources internally and externally by any means at hand, including untrusted cloud platforms and their own personal devices. Rarely intentionally malicious, these practices add intelligent identity management and granular user authentication as extra security overheads to a list that already includes data leakage, malware, exploits and hackers. These multilayered risk and security challenges can only be met with a blend of technology, consultancy, commitment, resolution and a genuine willingness to adapt. 

IT managers must continue to mitigate all these issues by taking the smartest precautions that they can to manage them effectively and strike a balance between security, productivity and cost. A thoroughly planned, practical security strategy will always help to improve protection levels, while also reducing costs. Businesses must take a risk-based approach; develop objective security plans that are prioritized and actionable; gain a better understanding of actual risks, costs and benefits; and then invest time, money and effort primarily in those areas that are of greatest value. 

Achieving this will always demand cultural change, collaboration and measured partnerships – and not merely a stack of sophisticated security equipment.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in Opinions

Technology alone isn't going to secure IoT connected devices

Technology alone isn't going to secure IoT connected ...

It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.

DDoS is the new spam...and it's everyone's problem now

DDoS is the new spam...and it's everyone's problem ...

As new solutions emerge, it's critical for organizations to protect themselves by being informed, aware, and acting whenever possible. Those that don't take action are playing a very dangerous game.

Securing the autonomous vehicle

Securing the autonomous vehicle

We are now in the fast lane towards a driverless future. Will we have to brake for hackers?