New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Why security strategies need a new perspective

New York Tech Editorial Team by New York Tech Editorial Team
February 9, 2022
in Cybersecurity
0
Proven third-party risk management strategies
Share on FacebookShare on Twitter

After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a well-designed cybersecurity strategy. But, confronted with a complex and confusing threat landscape and an equally multi-faceted security vendor landscape, many are uncertain what their security strategy should look like.

strategy cybersecurity

In the current debate, one essential factor is often overlooked: the people most relevant for your security strategy may not even work for your company yet (and no, I’m not talking about those incredibly hard-to-find security professionals.)

Many cybersecurity discussions focus on specific threats: ransomware, intellectual property theft, or any of the numerous digital holes allowing threat actors to break into company networks and wreak havoc. A second, equally prevalent strand of debate focuses on individual components of the environment that need protection: a company’s business-critical core applications, its email and collaboration infrastructure, the cloud services it uses, its website and e-commerce applications, or – in the manufacturing industry – the increasingly internet-connected manufacturing plants with their often insufficient mechanisms for securing operational technology (OT) infrastructure.

A third aspect tends to come into play only as an afterthought: the employees. When they are mentioned in the security debate, it tends to be either as targets for social engineering campaigns, as “dumb users” clicking on malicious links that open doors for threat actors, or as malevolent insiders exfiltrating sensitive data. Rarely, however, are employees given the full weight they deserve in security discussions: the pivotal role around which all other aspects need to revolve. It is employees, after all, who work with all these business-critical applications and sensitive data pools, and they are the people who drive every company’s business. In security strategies, employees need to take center stage, instead of being relegated to the wings.

When it comes to designing a cybersecurity strategy, it makes sense to move beyond all the noise about the latest and most sophisticated attacks and the latest and most sophisticated security solutions, and focus attention on the employees instead – but not necessarily on the current staff. Rather, the fundamental security strategy question is: what will the needs and the security requirements of my employees be in four years’ time?

The workforce of 2026 will be digital – much more digital than today’s – even in areas that traditionally have been considered less prone to digitization, such as workers on factory floors, in communal services, or in agriculture. At the same time, employees already working digitally today will most likely not be the office workers that used to dominate many business campuses in pre-COVID lockdown times. The reason for that is that even before the pandemic, digital work had shifted towards flexible hybrid work. The latest generations of digital workers have long progressed to using mobile, sometimes even privately-owned devices to access a steadily growing range of cloud services, in addition to corporate resources, from anywhere. The pandemic, with its recurring lockdowns across many countries, has simply accelerated this trend, and has made it more obvious to the public.

The digital workforce – especially the highly skilled professionals that businesses compete for in the global “war for talent” – will increasingly insist on being able to work efficiently, but at the same time conveniently and securely, wherever they want or need to engage. Some will bring their own devices, some will prefer to use corporate-owned ones, and some will use a mix of both.

At the same time, the move towards cloud services is bound to intensify, while many businesses (e.g., manufacturing) will also continue to deploy a growing number of applications at the edge of their networks. This will result in a progressively complex hybrid application landscape consisting of on-premises legacy technologies, modern on-premises or cloud-based applications, mobile apps, and a dynamic set of cloud services. Here, the challenge will not only be to protect employees in working with this elaborate mix of applications and services – it will also mean keeping use of unwanted apps and services at bay, or at least monitoring it closely.

Taking the work, collaboration, and usability needs of their future workforce as a reference point, decision makers can evaluate: What will be the most likely – and most critical – security risks for this workforce? For example, high-profile employees will sooner or later find themselves in the crosshairs of targeted attacks, be it by cybercriminals or state-backed threat actors. At the same time, it is important to remember that basically every employee, from the call center agent to the HR or finance team, will be targeted – after all, a successful attack hinges on a single person clicking on a malicious link.

Once the risk landscape of the future workforce is established, numerous questions follow naturally:

  • What will employees’ most pressing needs be when it comes to working securely from anywhere, anytime, with any device of their choice, and with their preferred set of apps and services?
  • How flexible and scalable will the security architecture need to be to cope with the dynamic nature of the hybrid multi-cloud infrastructure accessed by the distributed workforce?
  • Most importantly, how can employees’ security needs be balanced with a smooth user experience – especially considering that complex security tools as well as slow app and data accessibility will entice employees to start looking for workarounds, thereby weakening the company’s security posture?
  • And how can this security posture be monitored continuously without running the risk of impeding employees’ productivity and motivation?

What is now called the “new normal” of flexible remote work will soon be the “well-established normal“. The whole digital workforce, not just highly skilled individuals, will expect to be able to work flexibly, remotely, in accordance with their individual needs, and securely. They will want – and need – to decide for themselves what is best suited to their work style, and to the current task at hand. The security architecture will have to support the full spectrum of these needs and requirements. Decision makers should plan for the workforce their business will depend upon in the future, not for the problems they battle today – even if that means planning for the security of employees they don’t even have yet.

Credit: Source link

Previous Post

Product showcase: Oxeye.io – Cloud native application security testing

Next Post

Insurance-Tech Startup Raised $37 Million With This Pitch Deck

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Insurance-Tech Startup Raised $37 Million With This Pitch Deck

Insurance-Tech Startup Raised $37 Million With This Pitch Deck

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Recommended

New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media