Real-time Communications - Voice, Messaging, Video or Collaboration

Real-time Communications – Voice, Messaging, Video or Collaboration

The Communications Cloud As more and more real-time communications – whether voice, messaging, video or collaboration – move to distributed software and cloud infrastructure, the management and security of real-time services becomes increasingly complex. Enterprises are moving to a zero-trust security posture, which means that every
Protect Your Small Business

Why Nonprofits Might Be at Higher Risk for Cyberattacks

Cyberattacks On Nonprofits Today's society is one where any organization operating online is theoretically at risk for cyberattacks. Such incidents could tarnish reputations, result in profit and data losses and even get so severe that they force the attacked organizations to shut down due to
George Foot

Immune Systems: Information Security And Risk In 2016

Information Security And Risk

C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and IT departments, it’s now squarely at the top of the agenda. Recognising the threat is one thing. The challenge for organizations is to find ways of understanding the risks and constructing robust systems. In this article, I want to look at how a risk-first approach to IT security and shrewd recruitment can boost a business’s immune system.

Identifying Risk

As companies continue to digitize their operations, the potential of information security breaches to damage trust and their competitive position increases. Information security risks are multiple and manifold. They could, for example, involve companies that rely on information as a means of generating value, such as banks or energy suppliers who must address a wide range of threats.

cloud-security

Equally, any company that holds large quantities of customer information runs a risk. This risk is particularly acute for SMEs, for whom the financial costs of information security can be prohibitive. In the digital economy, information is an asset that creates value for organizations; but this value is what makes it vulnerable.

Identifying these risks evidently requires expertise and coordination. Many businesses no longer see information security as simply something to do with IT. Rather, IT security is now bound up with wider risk management policies. But old habits, and ingrained divisions, can still be an obstacle for organizations. This goes for IT departments as well as management. In the past, IT departments habitually addressed security challenges by starting with technology and costing before moving on to consider the potential risk of an investment. In 2016, however, security has moved to front of
people’s thinking. Investing in the right IT systems now means first identifying the risk and then finding the devices and technology.

Mind the Gap

One area where firms have been slower to respond, however, is recruitment. The shift in the landscape has opened up a sizable skills gap, with organizations competing to recruit and retain employees with the necessary skills and experience. While good news for employees who can easily
find opportunities in the public and private sectors, this has caused problems for CISOs tasked with sourcing and training the people who can both identify and take steps to mitigate the cybersecurity risks that businesses face. In this environment, the challenge for organizations is to find ways to open up career paths and build expertise into a business, while still keeping costs down. In a survey carried out by Deloitte, 59% of CISOs identified the inadequate availability of cybersecurity professionals as a barrier to information security, with many turning to outsourcing to fill the gap.

trends-security

To my mind, this barrier serves to reinforce the importance of taking holistic approach to information security. IT departments must communicate effectively with management and HR departments to ensure that risks are identified and addressed, and that the organization has the right people for the job. As digitization continues apace, getting this process right is only going to become more important.

By George Foot

George Foot

Vice President Kensington Europe & Global Marketing

George has been a part of Kensington for over 10 years and now serves as the Vice President for Kensington Europe & Global Marketing. George has extensive experience within the consumer electronics industry and possesses a great passion for technology. He is responsible for setting the vision and strategy for the region, Go-To-Market delivery and sales performance.

View Website

TOP ARCHIVES

Max Contributor

Zero-Rating and Data Consumption

Zero-Rating The ordinary mobile user often feels the need to backup their personal files only after they’ve lost it. It’s ...
3 Challenges of Network Deployment in Hyperconverged Infrastructure

3 Challenges of Network Deployment in Hyperconverged Infrastructure

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, ...
5 Predictions for Data in the Cloud and Cloud Platforms

5 Predictions for Data in the Cloud and Cloud Platforms

5 Predictions for Data in the Cloud 2017 has proven to be a big year for migrating data to the ...
Business Intelligence Implementation

10 Tips For Successful Business Intelligence Implementation

Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, ...
4 MONETIZATION MODELS FOR THE DIGITAL BUSINESS ERA

4 MONETIZATION MODELS FOR THE DIGITAL BUSINESS ERA

4 Monetization Models Digital business is expected to generate billions in new revenue in the next four to five years ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...