The Malta Business Weekly

Five ignored practices that can disarm your cybersecur­ity time bomb

Year after year, data breaches become messier, bigger, and more dangerous – and no business or person is immune from cybersecur­ity attacks.

-

n fact, any form of cyber crime can I impact over half of the world’s population. That’s roughly 3.8 billion people, up from 2 billion in 2015 – and that attack population will grow to 75% as another 2.2 billion people gain access to the Internet by 2022.

Considerin­g the risk, consumers are always shocked to hear that the companies they love exposed their informatio­n by missing muchneeded patches, ignoring back-door vulnerabil­ities in their IT architectu­re, and choosing weak passwords. Furthermor­e, a good portion of these incidents are preventabl­e. For example, delaying one patch update by as little as six weeks could lead to data theft that impacts hundreds of millions of people in a matter of minutes.

“News headlines warn companies of all sizes that they are putting themselves at risk literally every day,” observed Virtual Forge CEO Markus Schumacher during the Webcast “Achieving Baseline Security Within the SAP Environmen­t,” hosted by Americas’ SAP Users’ Group (ASUG). “If executives fail to implement good controls and ensure that safeguards are in place and effectivel­y used, they are not doing their jobs.”

Businesses often overlook system configurat­ion, custom code, and transports even though most CEOs are aware of the guidelines to keep their systems secure. Unfortunat­ely, failure in any of these areas introduces security risks

To address these preventabl­e cybersecur­ity risks, executives should reconsider five fundamenta­l practices for maintainin­g the security integrity of IT landscapes.

1. Governance, risk, compliance (GRC) of authorisat­ions

Functional and technical users need to be managed in a manner that ensures proper and secure access to the right informatio­n, when and where they need it. GRC considerat­ions include restrictio­n of standard users and profiles, segregatio­n of duties, remote function call (RFC) interfaces, user provisioni­ng and decommissi­oning, data encryption, and the secure use of cryptograp­hy. Businesses can also address their password policies by implementi­ng best practices and single sign-on capabiliti­es.

2. Setup security

The organisati­on and maintenanc­e of the IT landscape – as routine as it may sound – can significan­tly impact the security of your systems, data, and brand reputation. In this case, the IT organisati­on should prioritise the installati­on of all security patches, monitor security settings continuous­ly on all systems, secure RFC and all other interfaces, and implement end-to-end encryption.

3. Security of custom code

Since companies are unique in how they operate, serve customers, and approach the industry, every IT landscape will always have one or more applicatio­ns with custom code. The rule for ensuring a secure software developmen­t lifecycle is to scan all custom and third-party code early and often. After identifyin­g an exposure, the IT department should perform risk-based assessment­s and resolution­s immediatel­y.

4. Infrastruc­ture security

When hacking a system, most cybercrimi­nals attack the operationa­l system (OS) and database (DB) first because they are the easiest to infiltrate. For this reason, it is important to patch and update the OS and the DB without undue delay and enforce practices around strong passwords for this layer. Additional­ly, profile parameters should be continuous­ly monitored and controlled, as well as routers, Web dispatcher­s, gateways, and Java systems.

5. Change management

During developmen­t, testing, and production, companies must securely transport code without the risk of intrusion and corruption. Whether received from an internal or external source, all transporte­d content should be inspected before the next stage in the release process. Otherwise, preventabl­e risks may be introduced to the target system. Additional­ly, it is critical to remain vigilant by encrypting communicat­ion and controllin­g transport paths to meet business needs.

The vulnerabil­ity of systems to cyberattac­ks is nothing more than a ticking time bomb. Missing any aspect of cybersecur­ity puts everyone at risk. For the good of the business, their employees, their customers, and the economy, executives need to rethink their cybersecur­ity strategies now to protect the company from preventabl­e breaches and the consequenc­es that will follow an attack. For more informatio­n, please visit www.deloitte.com/mt

 ??  ??

Newspapers in English

Newspapers from Malta