Cyber Defense Magazine – July 2019

(Sean Pound) #1

Cybersecurity Hygiene


Finally, there is the challenge of deploying basic cybersecurity controls like vulnerability management
and anti-virus. Traditionally, solutions such as these were performed using network scanners, agents,
and services to execute various functions, and require connectivity to on-premise servers.


The good news is that cloud technologies have simplified management of these security basics. With the
inability for cellular and other mobile technologies to maintain a persistent and routable connection, it is
imperative that organizations embrace the cloud for managing basic cybersecurity disciplines. The cloud
offers universal resources—outside of a traditional datacenter—to which remote devices can securely
connect and take advantage of methodologies like geolocation and two-factor authentication, for
additional layers of security.


Best Practices for Securing a Remote Workforce


The best advice for CISOs that need to secure the remote workforce involves keeping an open mind and
being accepting of new technologies, methodologies, and workflows to accomplish security best
practices.


This includes using MDM solutions, leveraging the cloud, and monitoring data and workflows to prevent
a breach. CISOs need to think out of the box regarding connectivity. We can expect a bandwidth evolution
with 5G. Large-scale data theft can transpire within minutes using wireless technology. This can happen
via a remote employee copying the data from corporate resources, or from threat actors exploiting a
compromised remote employee account.


With all the above taken into account, CISOs need to understand their business models, the roles remote
employees play, and the data and system risks they represent. Only then, a defensive strategy can be
built using modern security technology and practices.

Free download pdf