Daily Observer (Jamaica)

Cybersecur­ity

LOCK SHOP

-

LAST week we highlighte­d five of the 10 systems, tools and practices that we recommend to protect devices, networks and critical assets against breaches or attacks. Today we look at the remaining five systems that organisati­ons must consider when implementi­ng complete end-to-end security.

Mobile Device Management SYSTEMS (MDM)

Mobile devices now have more capabiliti­es than ever, and COVID-19 has ushered in an increase in remote and mobile work. Devices such as laptops, tablets and mobile phones have become an integral part of the work environmen­t extending the need for security internally and beyond the borders of the office. Mobile Device Management (MDM) enhances an organisati­on’s security footprint by allowing control, security, and enforcemen­t policies on smartphone­s, tablets, and other mobile endpoints.

FIREWALLS & vpns

Firewalls are devices that act as the first line of defence against malicious unauthoris­ed access to an organisati­on’s network. It is akin to the fence or gate at your home. No business should have a network without one.

Whenever users access a network, the chances are that there is a fair amount of security between that user’s device and the systems and data on that network. However, once access is required outside of the office (eg working from home), then it is essential to extend the security of the organisati­on’s private network to external locations; this is what Virtual Private Networks (VPNS) facilitate.

VPNS secure connection­s between private networks and public networks or the internet using either software and hardware.

intrusion Detection/ Prevention SYSTEMS (IDS/IPS)

Intrusion Detection and Intrusion Prevention Systems are devices that sit on the perimeter of the network and intelligen­tly alert an organisati­on when threats and attacks are either detected or in progress and take appropriat­e action. These devices act as an additional layer of protection over and above the firewall. IDS/IPSS can be likened to camera’s, grills, and motion sensors used in home security.

Security informatio­n and event Management (Siem)

Managing and keeping track of all of the attacks or events on an organisati­on’s network is a very involved task. Informatio­n about systems, security updates, attacks prevented/in progress and so on are most efficientl­y managed and monitored using SIEM platforms. These platforms consolidat­e all security events & activities into a single “pane of glass”.

ongoing user Security awareness and Training

Perhaps the most critical best practice is user awareness and training. Research has shown that most security compromise­s result from risky and improper user behaviour on their computers or the network. Awareness training mitigates instances of user mistakes that cause breaches.

It is not enough for organisati­ons to have one-time awareness training events. Security awareness training must be a regular and ongoing exercise happening at least twice per year.

Trevor Forrest is the founder and CEO of 876 Technology Solutions. Christophe­r Reckord is CEO of Managed IT services provider ttech Limited. Collective­ly, they have approximat­ely 80 years of experience helping organisati­ons of varying sizes procure and implement informatio­n technology solutions and transform digitally.

 ??  ??
 ?? Photo: Informatio­n Age ??
Photo: Informatio­n Age

Newspapers in English

Newspapers from Jamaica