Security Market Segment LS
Friday, 29 May 2020 16:21

Breaches are Inevitable

By
Louis Tague, FireEye Louis Tague, FireEye

How do You Detect and Respond to Them?

GUEST OPINION By Louis Tague, Vice President, Australia and New Zealand, FireEye: As efforts to adjust to the “new normal” are forcing huge portions of Australians into remote working and outside the relative safety of their employers’ corporate networks, cyber risks have become top-of-mind even for employees who don’t work within security.

Their concerns are justified. Despite the security of the public cloud infrastructure, a rapid shift toward remote working means that the number of entry points into the corporate network has ballooned. Now that the corporate network extends through every public ISP into almost every household in Australia, there are far more opportunities to access cloud environments where organisations are storing more and more sensitive data. Cyber criminals have wasted no time in trying to capitalise on this new landscape.

 This creates obvious challenges for security teams, but there are both immediate and long-term ways to mitigate the risks. Here are three tips for protecting Australia’s suddenly remote workforce:

1. Extend monitoring and auditing into cloud environments.

Whether employees are accessing a public cloud through Azure or AWS, or public apps like Salesforce, organisations need to monitor the audit logins and traffic going from the corporate environment into their instances of the cloud.

Because attacks will generally come in through the corporate network rather than the back of the cloud, the type of traffic you’re seeing will need greater scrutiny. Just as unusual behaviour would be monitored in the corporate environment, it will also need to be monitored against organisations’ cloud environments, too.

2. Remember that your cloud’s credentials are your organisation’s crown jewels.

This is probably the number one most important thing any organisation can do toward securing cloud environments. While it might seem rudimentary for organisations with large security teams or budgets, small- to medium-sized businesses will need to make it a focus as best they can.

It will require monitoring to ensure that the right credentials are used for the right thing when users are logging into your cloud environment. As always, a large piece of this puzzle is protecting employees’ passwords through increased vigilance around phishing and ensuring that multi-factor authentication is used, especially those that would offer complete access to cloud-based environments.

One silver lining is that the influx of remote working has been accompanied by a growing number of cyber security conversations in traditional and social media, which means many workers are increasingly cognizant of their vulnerability. Now is a great time to continue educating them and helping them recognise risks like phishing attempts.

3. Looking toward a post-VPN environment — or, at least, one that’s less dependent on VPNs.

Employee education will always be important, but organisations also need to ensure they’re separating people’s personal activity on their laptop from their business use.

The radical increase in Australians working from home has heightened this issue. A huge number of organisations are leaning on VPNs to do this and, given the fast-changing nature of pandemic responses, this technology may be a necessary stop-gap solution for many teams. However, most security pros are also aware, as cloud applications increase, VPN as a legacy technology creates its own set of security risks and provisioning challenges.

Going forward, as more people acclimate to remote work, there’s a good chance that many organisations will retain some of the emerging norms and habits around working from home. This might even be a silver lining, with future employees working more flexibly and organisations operating with reduced overheads. But it also means that security teams will need to consider more sustainable options — ones with more  scalability, less bandwidth overload and more network security features than VPN technology.

While the foreseeable future will no doubt be challenging for organisations and security teams, it might also be a golden opportunity to rethink security approaches in ways that both respond to current crises and create more sustainable environments in the long run.

Read 2992 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




Maximising Cloud Efficiency - LUMEN WEBINAR 23 April 2025

According to KPMG, companies typically spend 35% more on cloud than is required to deliver business objectives

The rush to the cloud has led to insufficient oversight, with many organisations struggling to balance the value of cloud agility and innovation against the need for guardrails to control costs.

Join us for an exclusive webinar on Cloud Optimisation.

In this event, the team from Lumen will explain how you can maximise cloud efficiency while reducing cost.

The session will reveal how to implement key steps for effective cloud optimisation.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Staff Writers

Our Staff Writers and Guest Writers contribute content to iTWire each day and they are a valuable asset to the team. If you want to be a staff writer please contact us.

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments