Digitalisation World - ISSUE VII 2021

Page 20

CYBERSECURITY

Delivering an effective cybersecurity strategy

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. BY RICHARD SLATER, HEAD OF MANAGED SERVICES AT AMIDO WHILST MANY HAVE STRUGGLED with security issues for decades, the COVID-19 pandemic has compounded such problems. The shift to remote working has made company devices and critical business activity vulnerable to unsecure home networks which exist outside of the scope of traditional security operations teams. This has resulted in many IT teams struggling to safeguard their data and adjust their security practices over the last year. Whilst many saw the pandemic as a catalytic moment for digital transformation, there’s no reason why the same can’t be said for cybersecurity. However if companies are going to revolutionise their security practices, they must rethink the way security is

20

WWW.DIGITALISATIONWORLD.COM

l

ISSUE VII 2021

l

communicated across the business. Here are three vital components that make up an effective cybersecurity strategy in 2021.

Sync cybersecurity with strategic goals A successful cybersecurity strategy should be in sync with a company’s strategic goals and must avoid hindering business performance or productivity. Historically, cybersecurity measures have made it harder for employees to carry out their day-to-day operations, with restrictions in place that strangle operational effectiveness. However, if cybersecurity measures restrict workflow this will lead to frustration among employees and limit the amount of staff adhering to necessary security procedures and even

COPYRIGHT DIGITALISATION WORLD


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Providing reliable, long term SaaS services The importance of scalability

28min
pages 70-79

How is the cloud encouraging hyperautomation, and why should I care?

6min
pages 68-69

How data is changing the way hotels streamline operations

5min
pages 60-61

Delivering deep-link analysis

6min
pages 62-63

How to navigate intellectual property risk in blockchain projects

5min
pages 56-57

Don’t wait for blockchain, it’s more accessible than you think

5min
pages 54-55

Blockchain vs Bitcoin Everything you need to know

13min
pages 48-53

Five practical ways contact centres can use AI to create value

9min
pages 44-47

Machine Learning success starts with 10 steps

6min
pages 42-43

How is QKD combatting the increased sophistication of today’s cyber-attacks?

4min
pages 38-39

How mass remote work has changed DDoS

5min
pages 40-41

A three-pronged approach to government security

3min
pages 36-37

How to develop and maintain an effective DevSecOps culture

7min
pages 32-35

A question of priorities

4min
pages 24-25

Delivering an effective cybersecurity strategy

5min
pages 20-21

Common misconceptions around cloud native security

4min
pages 22-23

Covid - the ultimate digital test?

2min
page 10

Strong growth for the managed edge services market

10min
pages 16-19

Average phishing costs soar to $14.8m

2min
page 11

Over a third of organisations worldwide experience ransomware attack or breach

3min
pages 14-15

AI spend to reach almost $342 billion this year

4min
pages 12-13

Digital darkness across Europe

4min
page 8

Security and silos hold back automation initiatives

2min
page 9

90% enterprises yet to achieve digital-first goals

3min
page 6
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.