Page 5 - NOVEMBER MAGAZINE 2022
P. 5
A seasoned and accomplished leader with In an interaction with Team Digitaltech Media,
diverse sales, business, and partner leadership Debasish spoke about the growing market and
experience in the IT industry, Debasish brings demand for data protection & privacy and how
Global and Cross-cultural work experience from SonicWall offers the best-in-class tools &
both India and the Gulf. He holds an MBA from t e c h n o l o g i e s f o r s a f e g u a r d i n g d a t a .
the New Delhi Institute of Management with a Read excerpts from his interview below.
specialization in marketing and is a Graduate in
Science.
Can you throw more light on the business email compromise How Businesses and IT Leaders
growing importance of data (BEC), and ransomware. For can address these issues?
protection & privacy? instance, many organizations Every organization is different,
h a v e i n a d e q u a t e b a c k u p
Today, data is boundless and and there is no single approach to
m o v e s a c r o s s a l l s o r t s o f processes to enable them to creating a sound, layered
recover from a ransomware
b o u n d a r i e s , d e v i c e s , a n d
attack rapidly, and others lack cybersecurity environment.
geographies. Data plays a crucial
strong internal control processes While there are many different
role for organizations for business,
t h a t w o u l d p r e v e n t C E O routes to achieving this kind of
financial growth, and other Fraud/BEC attacks.
management decisions. Such a cybersecurity posture, some of
What about a data recovery the essentials include:
scenario creates an increased
post-attack?
requirement for defense against Network security
cyber warfare. At SonicWall, we have always Real-time sandboxing
believed that a good backup
Organizations must recognize Zero-trust security
process and strategy is the
and address the increased Strong authentication
primary line of defense for data
cybersecurity risks from all
recovery after any cyber-attack. TLS/SSL inspection solutions
aspects of their network. Today
Enterprises need to ensure that Cloud application security
there's a greater need to secure the backup solutions used are Mobile and remote access security
and establish an IT framework to resistant to ransomware or any Email security solutions
build a solid foundation for a other attacks while monitoring
healthy data security and privacy the status and integrity of India is still waiting for a data
plan. backups continuously. protection law. What can we
expect next?
Why do you feel the protection Recovery as a process goes
gaps are growing? beyond restoring the data. As far as data protection laws and
Having the tools & processes for policies are concerned, one of the
Cybercriminals are succeeding restoring endpoints to a golden primary issues is that most Indian
because organizations fail to image can speed up the recovery sectors using digital technologies
exercise adequate due diligence time. Also, security hygiene is
to address the issues of phishing, critical to protect against o r i n t e g r a t i n g e m e r g i n g
spear phishing, CEO fraud/ - “human-operated” attacks, and technologies do not have a digital
a holistic view of the entire r i s k e l e m e n t d e fi n e d b y a
organization is required. regulatory authority.
Nov. 2022