Advertisment

With the rise of digitisation, the worst is yet to come

author-image
Sunil Rajguru
New Update
hacker

Jyoti Prakash Country Director of Enterprise Security Business, Micro Focus India, says that at least 4 billion records, including credit card numbers, home addresses, phone numbers and other highly sensitive information, have been exposed through data breaches in 2019.

Advertisment

Has 2019 been a bad year for cyber security?

Data breaches have gained a lot of attention owing to the rapid evolution of digitisation. Businesses of all size, nowadays, have become increasingly dependent on digital data, cloud computing and workforce mobility. With data being stored on machines, database and servers, invading a company’s data has become simple.

If we look at 2019, half of the year is already on the books and there have certainly been data breaches, supply chain manipulations, state-backed hacking campaigns, cyberwar, etc. to show for it. Whether it is the recent Poshmark breach, Capital One breach, Bulgaria’s National Revenue Agency breach, NASA breach or Facebook breach, millions and millions of users have been affected worldwide. If you look at it, on an average, every 10th day of the month you see another breach happening across every corner of the globe.

Advertisment

Given the rise of digitisation, we feel that the worst is yet to come. We will see an increase in targeted ransomware attacks—criminal groups continue to target businesses, banking, health care providers, and, most visibly, local governments with these brash hacks. At least 4 billion records, including credit card numbers, home addresses, phone numbers and other highly sensitive information, have been exposed through data breaches in 2019.

According to a recent report revealed by EY, more than three-quarters (87%) of organizations do not yet have a sufficient budget to provide the levels of cybersecurity and resilience they want, a reason why data thefts are happening. In India, we feel that 2019 will be a challenging year for security professionals. These new threats and challenges prevailing in the country will incite professionals to think differently in order to address the same.

Going forward, companies need to ensure that sufficient budget is provided to help overcome the growing concerns of cybersecurity. Additionally, they will have to invest in upskilling their security professionals so that they can get ready to address and respond to known, unknown threats. While this year has seen a lot of cyber-attacks, we are confident that companies will come up with more features and solutions that will help reduce such incidences.

Advertisment

What are the further threats we can expect as digital transformation cases are on the rise?

The advent of immersive technologies is causing firms to reimagine traditional business models and innovate new ways to leverage data for growth. According to a recent IDC research, two-thirds of the CEOs of Global 2,000 companies will shift their focus from traditional (offline) to modern (digital) strategies in order to improve customer experience, before the end of 2019 – with 34% of companies believing that they will fully transform themselves digitally within 12 months or less.

While digital transformation is altering security needs in some fundamental ways, here are some of the changes that we should be aware of:

Advertisment

* Expanded attack surface—As more and more applications, data and processes move into the digital realm, hackers will get more opportunities to invade.

* Damage can be high—Given the dependency of organisations on digital technologies, an attack can be more damaging for them.

* Uncontained enterprise networks—Most companies use some kind of digital applications and may host their servers in the cloud. It means the company networks are not contained and have connections to the publicly accessible internet. This can help hackers access the company networks and ruin their infrastructure.

* Rapid change—The increased speed of technological advancements makes it easier for security vulnerabilities to slip through. Since cybercriminals are coming up with advanced ways of hacking, security professionals need to work constantly to come up with new ways of protection.

* Increased sophistication of attacks—Technological advancements have made cybercriminals more sophisticated in nature. While an AI solution is a welcome boon for companies, it is also aiding cybercriminals.

As threat landscape continues to evolve, companies need to adjust their strategies. There is a tremendous value with having the right combination of technology products and processes in the digital transformation journey. An agile enterprise can thus, help act rapidly and react to changing data, competitive conditions and strategies to succeed and guard against disruption. Additionally, DevSecOps is going to lead this transformation journey, as applications are becoming business drivers. They are also becoming more prone to targets. We feel that a wholesome security strategy, embedded in each stage of application development cycle, would be the right move ahead.

What will be the dangers in Industrial IoT (Industry 4.0)?

Advertisment

Industry 4.0 or the increased connectivity of smart machinery indicates a new age of connected, smart manufacturing, responsive supply networks, and tailored products and services. It strives to marry the digital world with physical action to drive smart factories and enable advanced manufacturing. While Industry 4.0 plans to enhance digital capabilities, it will also bring new cyber threats, for which the industry is still not prepared.

The top IIoT implementation challenges that organizations are facing today includes the following:

* Connectivity outage challenge—If an enterprise is planning to implement IIoT technology in their system, an uninterrupted connection, will be the critical need. There are times when the connectivity will be lost due to maintenance or some other reasons. Hence, it would be best to make sure to use proper cables and set a system that guarantees zero data loss—even in case of connectivity issues.

* Delivering value to customer—IIoT solutions’ implementation can severely impact the efficiency, customer satisfaction and productivity in the long run. Hence, a company needs to have a great understanding on the same to deliver value to customer—consultants will help figure out key performance indicators to measure and improve through an IIoT solution.

* Data storage—IIoT supports in collecting thousands of data points that are relevant to future aspects of the business. Hence, it becomes imperative for any enterprise to plan for a secure storage of data before implementing IIoT solutions.

* Security—Owing to cyber-attacks, even if a company plans to overcome such issues through IIoT, they need to introduce new tools to the network which may involve a lot of expenses. Hence, companies are resisting the idea of IIoT until they are equipped with solid security plan in place.

Advertisment

Will AI-ML make our systems safer or will they lead to their own host of problems?

As we are going ahead with the fast-paced digital environment, we see a drastic rise in data volume—this leads to a requirement for a strong cyber breach defence framework. We need to implement a holistic security framework to identify, protect, detect, respond and recover from cybersecurity threats—AI & Analytics can help only if it is implemented in the right manner. Acquiring data from historical threads and baselining the same is of utmost importance in order to detect threats properly and efficiently. This will in turn, help reduce millions of threat incidences into limited “Threat leads” and AI framework will play a critical role here. Going forward, AI will be used extensively for fraud detection and humans can have some free time to innovate and focus more on strategic tasks. As such, companies need to up their anti-fraud tech budgets and investments for a secured Hybrid IT environment.

What exactly is a Security Operations Center (SOC) and why should enterprises invest in it?

Advertisment

SOC has a single co-relation engine, along with a single dashboard, which collects lots of technologies and gives a holistic and real-time view to any end customer. In fact, it is a journey that one needs to take and even if one invests in a SOC, it is pertinent to figure out whether the SOC is functioning efficiently or not. With an integration of SOC with multiple products—coming from multiple sources, real-time analysis that one gets, visibility that one has, compliance level and policy that needs to be enforced, are the trigger points that define the efficiency of a SOC. So, any organisation who has already invested in a SOC will be able to identify if there’s any data breach that is happening or is about to happen. This is the reason why SOC came into the market and over time, it has become much more intelligent.

Are CIOs/CTOs able to keep up with the above-mentioned threats and what more do they have to do to keep their enterprises safe?

CIOs/CTOs need to spend time and effort to reduce business friction, minimize wasted time and resources. They should work together to minimize the historical tension between IT and rest of the organization. CIOs/CTOs, as leaders, need to increasingly teach others how to respond to coming transformation and be adept at selecting the most efficient IT platform and employing agile, lean development practices. Additionally, they need to take out time to train their IT professionals on company’s business culture and customer expectations, for a better and safe enterprise.

Is cyber insurance necessary and what kind of insurance should be done?

With digital transformation on the rise, security concerns have also risen. Today, majority of us use smartphones/laptops and carry out financial transactions not just from our personal gadgets, but also from office computers and public internet connections. Accessing personal information from various devices, hence, exposes us to different types of connectivity risks. It is, hence, imperative for us to secure data.

A cyber insurance policy protects companies from online breaches on all gadgets that are connected to the internet. It helps an organization mitigate risk exposure by offsetting costs involved with recovery after a cyber-related security breach or similar event has happened. While cyber insurance cannot stop cybercrime from happening, it can help maintain/stabilize a business’ financial structure, should a significant security event occur. Any organisation that collects, stores and maintains customer data or facilitates and stores online transaction data, or uses cloud, should ensure adding cyber insurance to its budget. This will help save organisations from huge business loss in terms of financials.

cybersecurity
Advertisment