Developing a mature security model
Being confident that your security measures and solutions are effective is crucial for today’s enterprises. As cyber attacks grow exponentially, in both frequency and sophistication, businesses of every type and size are battling to stay ahead of the threats.
“Picking and choosing which security technology investments will lower your risks depends on many different factors,” says Jayson O’Reilly, Director of Sales and Innovation at DRS.
Success is dependent on having a mature information security plan in place, and a way to make accurate, risk-based decisions. “There is the erroneous perception in the market that effective security means outlaying millions of Rands. This results in some businesses throwing more and more money at the problem, without getting the results they hope for, or a good return on their investment. Other companies decide that they can’t afford such sums, and adopt a ‘keep your fingers crossed’ approach. Neither approach is effective,” he adds.
“The fact is, you cannot achieve good security by throwing more and more money at the problem, and you most certainly can’t by ignoring it either.”
He says there are several factors that lead to good security. “Firstly, involving everyone in the company. Security is everyone’s problem, and employees need to accept this. If they understand what is really involved, and what the potential fallout of a breach could be, they are more likely to do their bit.”
Having said that, O’Reilly says that this responsibility needs to start at executive level. “Top executives must understand that security is a business priority and support the technical team all the way. They must be willing to spend the necessary, and they must appoint someone who has ultimate responsibility. The next step is having a separate security budget in place. While, as discussed, security is not bettered by having more and more money thrown at it, the security budget must be kept separate from overall IT expenditure. Should it be lumped in with general IT spend, it will always lose out, to other IT needs that are considered by some to be more important.”
O’Reilly also advises businesses not to fall into the trap of having too many solutions. “Too often, companies jump on the bandwagon of every new tool and solution available. Rather stick to the basics – a good firewall, anti-malware, some netflow monitoring – these are the essentials. Use the tools you have, and automate as much as possible. Keep accurate and up-to-date records about any incidents to make sure they don’t happen again, and have a good incident response plan in place. Test your applications and systems frequently to make sure any issues are uncovered by you, instead of a threat actor.”
At the end of the day, effective security can be measured by how well you handle the basics. “Good tools, employee involvement, and executive buy-in are a good place to start.”
Behind the Scenes
DRS is an ICT services and solutions provider that offers ingenious security services with a portfolio that covers customer needs from the creation of security strategy to the daily operation of point security products. DRS partners with market-leading technology providers to ensure the best possible infrastructure and adds the services to ensure that the chosen products are effectively implemented and operate efficiently.
The company specialises in providing innovation and agility in the areas of information security, IT risk management and IT governance, focusing on key areas ranging from Anti-Malware Protection, Desktop Firewall/ Host IPS for PC’s, Content Filtering to Perimeter Firewalls, Intrusion Detection and Prevention, Vulnerability and Configuration Management, Security Event Consolidation and correlation and even Data Loss Prevention, Network Access Control, Encryption and even more.
DRS is a specialist in the effective implementation of many industry-leading technologies such as Air Defense, AccessData. ArcSight and many more. We strive to excel in all domains remaining entrepreneurial.
- Insights on Data 7: POPI gets implemented; now to help Business comply | #eBizInsights | Jayson O’Reilly of Atvance Intellect| Podcast - July 1, 2020
- Covid-19 killed traditional disaster recovery | #eBizInsights - July 1, 2020
- The ‘new normal’ way to operate your business | #eBizWires - July 1, 2020
- NGO’s during the Pandemic; Hope at the Darkest of times| #eBizPayItForward|Nomthi Mnisi | Podcast - June 27, 2020
- The business of sports broadcasting – live sport is back! | #eBizWires| Andile Qokweni - June 27, 2020
- Digitalising customer engagement vital for retail insurance growth | #eBizInsights - June 27, 2020
- The role South Africans can play as active citizens |#Matalane Ngobeni |#Podcast - June 24, 2020
- Insights on Data 6:How Hacks occur; a fast, ever-evolving landscape | #eBizInsights| Jayson O’Reilly of Atvance Intellect| Podcast - June 23, 2020
- Being an ”Essential Service” during Lockdown, Vox’s experience | #eBizInsights | Jacques du Toit of Vox| Podcast - June 18, 2020
- Covid-19 provides construction industry with opportunity for change | #eBizInsight - June 18, 2020