A recent CIO article, “Physical Security Has Many Holes to be Plugged,” offers some interesting insights and quotes on cybersecurity from high-level security officers and executives.
First, Sam Redden, chief security officer at Brazos Higher Education Service, a company that services billions of dollars in student loans, says he does his best to keep IT infrastructure updated. He has also learned to proactively communicate with his board of directors to show his team is doing all they can to protect the enterprise against attack.
Yet even so, he admits that this may not be enough. “I wouldn’t be foolish enough to say I stay one step ahead of the bad guys,” says Redden. “The bad guys stay one step ahead of everybody.”
That’s not their only advantage. The number of entry points that hackers and bad actors can use to gain access to business networks is increasing exponentially due to the Internet of Things (IoT) trend. Gartner estimates that the number of connected things in use will hit 4.9 billion by the end of 2016 and will reach 25 billion by 2020. That’s a lot of connected devices – and a lot of security risk.
All of this adds up to a need for new security technologies and strategies. Perhaps this is why 50% of IT professionals who participated in ComputerWorld’s Forecast 2016 survey reported that they would increase spending on security technologies in the next 12 months. This was the leading category, ahead of other important technologies such as cloud computing, business analytics, and mobile applications.
“A lot of companies focus on advanced capabilities, but you really need to be brilliant at the basics: Make sure you’re patching your infrastructure, patching your desktops, and have the right operational capabilities to see what is happening on your network.”
Build a Security Foundation
Yet the question remains: Even with additional investments in network security technology, what can we all do to better protect our networks?
In the same CIO article, John Nai, chief information security officer at PayPal, recommends a focus on the basics.
“A lot of companies focus on advanced capabilities, but you really need to be brilliant at the basics: Make sure you’re patching your infrastructure, patching your desktops, and have the right operational capabilities to see what is happening on your network,” says Nai.
This is further support for the idea that companies need to improve network visibility as well as ability to alert key security personnel when something looks suspicious. Rob Joyce, the NSA’s chief hacker, recently made this his top recommendation for improving network security.
Dynamic Endpoint Modeling provides exactly this level of network insight and endpoint protection. Observable’s solution gives security professionals real-time insight into endpoint devices and alerts them when a device begins behaving abnormally. All of this gives you the best chance to detect and defend against attacks.
Experience Dynamic Endpoint Modeling on Your Own Network
Getting better visibility into your network and improving your security couldn’t be easier. Sign up for a free, no-risk trial of Observable’s Endpoint Modeling solution, and change the way you see security.