Page 9 - ANNIVERSARY EDITION JULY 2022
P. 9

A  visionary  with  expertise  in      to  cyber  security  and  data         Cloud Threats Exploit Weak
     executing major tech initiatives       p r o t e c t i o n   c o m p l i a n c e .   Configurations
     a n d   m a p p i n g   b u s i n e s s   Businesses  must  implement         The pandemic has taught us that

     processes, and over 24 years of        robust  security  controls  across     cloud-based  infrastructure  is  a
     experience  behind  him,  Anand        layers efficiently to safeguard the     key factor in moving to a remote
     Sinha is a force to reckon with.       organization's  digital  assets  to    workforce.  Due  to  this,  we  will
     Continue  reading  to  find  his        e n s u r e   u s e r   a n d   d e v i c e   c o n t i n u e   t o   s e e   m o r e
     expert  opinion  on  the  need  for    authentication, data & resource        organizations  making  these
                                                                                   transitions  to  the  Cloud  and
     assessing  the  constantly             access  control,  data  privacy        increasing  usage  of  cloud-
     changing threat landscape and          p r o t e c t i o n ,   a n d   s u p p o r t   based  solutions  and  services.
     the  trends  that  will  shape  the    businesses  with  regulatory           Cloud  threats  exploit  weak
     future  of  the  cybersecurity                                                c o n fi g u r a t i o n s ,   a n d   n o n -
     industry in India.                     compliance.  All  information          adherence  to  standard  security
                                            assets (data) are subject to the
     Why Organizations Must                 same procedures.                       practices  in  these  deployments
     Decode the Threat Landscape?                                                  leads to increased cybersecurity
                                            Remote Workplace Security
     Organizations  must  focus  on                                                breaches, and a lack of security
     safeguarding data and business         Will Continue to Remain a              controls & tools to reduce the risk

     content,  such  as  PII,  KYC,         Top Priority                           a s s o c i a t e d   w i t h   c l o u d
     Financial  &  Customer  records,       Currently,  60%  -  70%  of  workers   infrastructure.  In  addition,  most
     etc.  Preventing  leaks  and  data     are  working  remotely.  These         organizations  also  leverage
     theft  is  critical  for  maintaining   c h a n g e s   h a v e   e x p o s e d   multiple  clouds  to  run  their
     your  customers'  trust  and           organizations  to  new  and            workloads. This further increases
     protecting  the  assets  that          challenging  attack  “surfaces”.       the threat exposure.
     contribute  to  your  competitive      Working  from  remote  will  Human error-Behind Data
     advantage. Board members are           continue, and cybercriminals will  Breaches
     worried  that  highly  sensitive       target  remote  access  services  Human error continues to be one
     business  information  and             that  include  attacks  on  Remote  of the primary reasons for data
     intellectual  property  may  be        Desktop  Protocol  (RDP),  Virtual  b r e a c h e s ,   a n d   l e g a c y
     exposed  through  accidental           Private  Networks  (VPNs),  Virtual  a p p r o a c h e s   o f   e m p l o y e e

     leaks  or  owing  to  increasingly     Network  Computing  (VNC),  security  awareness  compliance
     sophisticated cyber threats. As a      V i r t u a l   D e s k t o p s ,   e t c .   training  are  ineffective.  A  report
     result  this  has  become  a  key      Cybercriminals  will  continue  to     by  Verizon  on  data  breaches
     priority for all of us.                exploit  these  trajectories  for      gives  strategic  insights  on

     Ethical Approach to                    i n i t i a l   i n t r u s i o n s ,   l a t e r a l   cybersecurity  trends  that  the
     Cybersecurity is a Must                movement, and persistence. This        employees  directly  or  indirectly
     Organizations  should  have  a         leaves  organizations  more            made 34% of total attacks. Now
     large  framework  of  key  internal    v u l n e r a b l e   t o   a t t a c k .   Organizations  are  moving
                                                                                   beyond  awareness  programs
     policies,  procedures,  standards,     Organizations  should  look            and  investing  in  universal
     and  guidelines  with  a  strong,      beyond  traditional  approaches        c u l t u r a l   c h a n g e   p l a n s   &
                                            to security monitoring, detection,
     dedicated, and ethical approach                                               frameworks designed to provoke
                                            and  response  for  managing  a

                                            broader set of risks.                  more secure ways of working.

                                                                                                                    July 2022
   4   5   6   7   8   9   10   11   12   13   14