Developing a mature security model
Being confident that your security measures and solutions are effective is crucial for today’s enterprises. As cyber attacks grow exponentially, in both frequency and sophistication, businesses of every type and size are battling to stay ahead of the threats.
“Picking and choosing which security technology investments will lower your risks depends on many different factors,” says Jayson O’Reilly, Director of Sales and Innovation at DRS.
Success is dependent on having a mature information security plan in place, and a way to make accurate, risk-based decisions. “There is the erroneous perception in the market that effective security means outlaying millions of Rands. This results in some businesses throwing more and more money at the problem, without getting the results they hope for, or a good return on their investment. Other companies decide that they can’t afford such sums, and adopt a ‘keep your fingers crossed’ approach. Neither approach is effective,” he adds.
“The fact is, you cannot achieve good security by throwing more and more money at the problem, and you most certainly can’t by ignoring it either.”
He says there are several factors that lead to good security. “Firstly, involving everyone in the company. Security is everyone’s problem, and employees need to accept this. If they understand what is really involved, and what the potential fallout of a breach could be, they are more likely to do their bit.”
Having said that, O’Reilly says that this responsibility needs to start at executive level. “Top executives must understand that security is a business priority and support the technical team all the way. They must be willing to spend the necessary, and they must appoint someone who has ultimate responsibility. The next step is having a separate security budget in place. While, as discussed, security is not bettered by having more and more money thrown at it, the security budget must be kept separate from overall IT expenditure. Should it be lumped in with general IT spend, it will always lose out, to other IT needs that are considered by some to be more important.”
O’Reilly also advises businesses not to fall into the trap of having too many solutions. “Too often, companies jump on the bandwagon of every new tool and solution available. Rather stick to the basics – a good firewall, anti-malware, some netflow monitoring – these are the essentials. Use the tools you have, and automate as much as possible. Keep accurate and up-to-date records about any incidents to make sure they don’t happen again, and have a good incident response plan in place. Test your applications and systems frequently to make sure any issues are uncovered by you, instead of a threat actor.”
At the end of the day, effective security can be measured by how well you handle the basics. “Good tools, employee involvement, and executive buy-in are a good place to start.”
Behind the Scenes
DRS is an ICT services and solutions provider that offers ingenious security services with a portfolio that covers customer needs from the creation of security strategy to the daily operation of point security products. DRS partners with market-leading technology providers to ensure the best possible infrastructure and adds the services to ensure that the chosen products are effectively implemented and operate efficiently.
The company specialises in providing innovation and agility in the areas of information security, IT risk management and IT governance, focusing on key areas ranging from Anti-Malware Protection, Desktop Firewall/ Host IPS for PC’s, Content Filtering to Perimeter Firewalls, Intrusion Detection and Prevention, Vulnerability and Configuration Management, Security Event Consolidation and correlation and even Data Loss Prevention, Network Access Control, Encryption and even more.
DRS is a specialist in the effective implementation of many industry-leading technologies such as Air Defense, AccessData. ArcSight and many more. We strive to excel in all domains remaining entrepreneurial.
- Are you feeling overwhelmed by ONLINE SELLING? | Shelley Walters |#Sales |#Podcast - October 21, 2020
- Reverse Engineering Agency FTE Models |#LetsTalkDigital | #AudreyNaidoo |#Podcast | Shaneel Singh | MediaCom | Julian Mountain | GroupM - October 21, 2020
- COVID, a key catalyst for collective philanthropy |#PayItForward |#IPASA - October 20, 2020
- Do you have the mental endurance to do this thing called life and business |#LTC | #KevinBritz | Cobus Visser |#Coaching |#Podcast |#ebizradio - October 20, 2020
- Syncrony’s GreenLine adds trust to the bottom line | #eBizWires - October 20, 2020
- CORONAVIRUS: COMPLACENCY IS SOUTH AFRICA’S BIGGEST CHALLENGE | #eBizWires - October 20, 2020
- Parenting digitally connected children |#OneEyedMan |#MikeStopforth | Dean McCoubrey |#digital |#ebizradio - October 19, 2020
- From a truck helper to the head of Sales |#LTL |#KevinBritz | Naomi Basson | Romeo Langenhoven | #Leadership | Coca Cola South Africa |#Podcast - October 19, 2020
- Hussling on the side: How Moonlighting became the new normal | #eBizFinance | Sylvia Walker | Podcast - October 19, 2020
- Unpacking Data Skills and Literacy from a RSA context | #eBizInsights| Alan Browning of Atvance Intellect |Podcast - October 19, 2020