Intelligent CIO North America Issue 11 | Page 45

CIO OPINION saw malware following users into their homes during the pandemic , we also saw network attacks targeting software vulnerabilities in exposed services increasing at network perimeters ( such as on-premise and in the cloud ) and reaching an all-time high since 2018 .
It ’ s also important to note that there are classes of business and operational devices ( IoT and OT ) that cannot add endpoint-based security controls . Network-based protection is excellent at defending these IoT and OT devices .
How can cybersecurity truly become a ‘ community effort ’?
Whether you ’ re a security company , cybersecurity authority or just a business that ’ s experienced an attack , there are several programs and quantifiable options for sharing indicators of compromise and attack that can benefit the overall community ( such as public disclosure , bug bounty programs , work groups and more ). services they choose to use . Because your security is sometimes dependent on these other companies and vice versa , simply improving your own organization ’ s security can help all your connected customers .
Why is it important to share threat intelligence and security awareness ?
Threat intelligence ( TI ) – like who is attacking you ( or at least the IP addresses or domains of who is attacking you ) – is incredibly useful to others because often the same cybercriminals target multiple companies . The more TI the security and business community shares with each other , the more data everyone can add to their individual security controls . As far as security awareness goes , another company ’ s level of security may inadvertently affect yours , for example if you partner with a company and use their products and services .
Can you highlight some of the top protection strategies to avoid security incidents ?
There are also soft methods , like sharing information about your security efforts , challenges or breaches in a corporate blog or public advisory . The more help you can provide other companies in understanding and properly preparing for potential threats , the better .
Unfortunately , there is no cybersecurity ‘ silver bullet ’. The challenging part of security is that it requires a layered approach including many protection strategies , both technical and human . That said , there are three types of protections people should focus on today .
And finally , if you don ’ t share threat intelligence or even anecdotal tips , just improving your organization ’ s own security posture helps the community . For example , right now digital supply chain attacks are a concerning trend .
Almost all businesses have connections to other companies through partnerships or the products and
Cybersecurity is a cat and mouse game , and you must do everything right , whereas an attacker only has to find one mistake .
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 45