‘Fight­ing so­phis­ti­cated cy­ber­at­tacks de­mands a mul­ti­pronged strat­egy in­cor­po­rat­ing a com­plex set of ac­tiv­i­ties’

Voice&Data - - COVER STORY -


What re­sponse strate­gies are re­quired in this era where busi­nesses are highly prone to cy­ber-at­tacks?

In today’s het­eronomous en­vi­ron­ment where all busi­nesses are IT en­abled, the in­for­ma­tion in these sys­tems need to be highly se­cure and ac­cessed by au­tho­rized per­son­nel only. As data breaches con­tin­ues and cy­ber­se­cu­rity in­ci­dents grow ex­po­nen­tially in fre­quency, size, and cost, even the might­i­est of en­ter­prises and gov­ern­ments across the globe are wor­ried about se­cu­rity and cy­ber-at­tacks. Emerg­ing trends like mo­bil­ity, vir­tu­al­iza­tion and cloud adop­tion have cer­tainly com­pli­cated IT se­cu­rity.

Fight­ing so­phis­ti­cated cy­ber-at­tacks de­mands a multi- pronged strat­egy in­cor­po­rat­ing a com­plex set of ac­tiv­i­ties. The im­por­tant mea­sures adopted by the cor­po­rates in­cludes de­ploy­ing se­cu­rity de­vices, en­forc­ing se­cu­rity poli­cies, con­trol­ling ac­cess to re­sources, mon­i­tor­ing events, an­a­lyz­ing logs, de­tect­ing vul­ner­a­bil­i­ties, man­ag­ing

Srid­har Iyen­gar:

Vice Pres­i­dent, Man­ageEngine

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.