Page 9 - ANNIVERSARY EDITION JULY 2022
P. 9
A visionary with expertise in to cyber security and data Cloud Threats Exploit Weak
executing major tech initiatives p r o t e c t i o n c o m p l i a n c e . Configurations
a n d m a p p i n g b u s i n e s s Businesses must implement The pandemic has taught us that
processes, and over 24 years of robust security controls across cloud-based infrastructure is a
experience behind him, Anand layers efficiently to safeguard the key factor in moving to a remote
Sinha is a force to reckon with. organization's digital assets to workforce. Due to this, we will
Continue reading to find his e n s u r e u s e r a n d d e v i c e c o n t i n u e t o s e e m o r e
expert opinion on the need for authentication, data & resource organizations making these
transitions to the Cloud and
assessing the constantly access control, data privacy increasing usage of cloud-
changing threat landscape and p r o t e c t i o n , a n d s u p p o r t based solutions and services.
the trends that will shape the businesses with regulatory Cloud threats exploit weak
future of the cybersecurity c o n fi g u r a t i o n s , a n d n o n -
industry in India. compliance. All information adherence to standard security
assets (data) are subject to the
Why Organizations Must same procedures. practices in these deployments
Decode the Threat Landscape? leads to increased cybersecurity
Remote Workplace Security
Organizations must focus on breaches, and a lack of security
safeguarding data and business Will Continue to Remain a controls & tools to reduce the risk
content, such as PII, KYC, Top Priority a s s o c i a t e d w i t h c l o u d
Financial & Customer records, Currently, 60% - 70% of workers infrastructure. In addition, most
etc. Preventing leaks and data are working remotely. These organizations also leverage
theft is critical for maintaining c h a n g e s h a v e e x p o s e d multiple clouds to run their
your customers' trust and organizations to new and workloads. This further increases
protecting the assets that challenging attack “surfaces”. the threat exposure.
contribute to your competitive Working from remote will Human error-Behind Data
advantage. Board members are continue, and cybercriminals will Breaches
worried that highly sensitive target remote access services Human error continues to be one
business information and that include attacks on Remote of the primary reasons for data
intellectual property may be Desktop Protocol (RDP), Virtual b r e a c h e s , a n d l e g a c y
exposed through accidental Private Networks (VPNs), Virtual a p p r o a c h e s o f e m p l o y e e
leaks or owing to increasingly Network Computing (VNC), security awareness compliance
sophisticated cyber threats. As a V i r t u a l D e s k t o p s , e t c . training are ineffective. A report
result this has become a key Cybercriminals will continue to by Verizon on data breaches
priority for all of us. exploit these trajectories for gives strategic insights on
Ethical Approach to i n i t i a l i n t r u s i o n s , l a t e r a l cybersecurity trends that the
Cybersecurity is a Must movement, and persistence. This employees directly or indirectly
Organizations should have a leaves organizations more made 34% of total attacks. Now
large framework of key internal v u l n e r a b l e t o a t t a c k . Organizations are moving
beyond awareness programs
policies, procedures, standards, Organizations should look and investing in universal
and guidelines with a strong, beyond traditional approaches c u l t u r a l c h a n g e p l a n s &
to security monitoring, detection,
dedicated, and ethical approach frameworks designed to provoke
and response for managing a
broader set of risks. more secure ways of working.
July 2022