31.08.2022 Views

Cyber Defense eMagazine September Edition for 2022 #CDM

#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Social engineering, malware and other basic attacks remain the greatest threats to most businesses. A<br />

larger emphasis on training would be a simple, cost-effective way to combat these risks, yet people<br />

continue to ignore their weak points and take action when it’s too late.<br />

One reason companies are still undertrained is that they think an advanced cybersecurity infrastructure<br />

will do the dirty work <strong>for</strong> them. The system will stop all threats with no human intervention required. Of<br />

course, this misconception is not true. The cyberthreat landscape is always changing, so all systems<br />

need regular audits to address their vulnerabilities.<br />

Another problem with throwing money at cybersecurity is a lack of standardization. Using a wide range<br />

of tools to manage security threats can lead to operability issues. Collecting data <strong>for</strong> risk assessment is<br />

a key part of cybersecurity, but that task becomes more difficult as more in<strong>for</strong>mation sources get added<br />

to the mix.<br />

More in<strong>for</strong>mation does not always lead to more accurate risk assessments. Each tool operates<br />

independently, so each batch of data is also independent. This structure lacks the centralized intelligence<br />

that large organizations need to identify and address risks in a timely manner. Managing a constant<br />

stream of alerts is another downside to using many tools.<br />

Moreover, some companies add extra layers of defense just to meet compliance checklists. The security<br />

team might not even know a tool’s intended purpose. They won’t be able to interpret the data correctly if<br />

they don’t understand how the program works. As the late management educator Peter Drucker once<br />

said, “you can’t manage what you can’t measure.”<br />

<strong>Cyber</strong>security Fundamentals<br />

Throwing more money at cybersecurity can lead to an adequate solution, but it needs direction. The real<br />

fix is choosing the right investments and learning how to maintain them. Here’s what businesses should<br />

focus on to improve their cybersecurity.<br />

1. Cloud Storage<br />

Rather than buying a bunch of miscellaneous security tools, businesses should take a more centralized<br />

approach with cloud storage. Cloud storage keeps data on one plat<strong>for</strong>m, making monitoring and<br />

evaluating much easier. The security team can oversee employee in<strong>for</strong>mation, customer files and<br />

financial records from one standard source.<br />

Cloud computing is especially beneficial <strong>for</strong> remote employees who spend most of their time navigating<br />

the web on their own devices. They’re more vulnerable to a cyberattack than in-house workers. A cloud<br />

storage system can give their in<strong>for</strong>mation the same protection as the rest of the staff.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2022</strong> <strong>Edition</strong> 152<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!