

Withtheneweraofemergingtechnologiescomesthewaveofchangeanddisruption.Whilebusinessesarefocusing
onthesetechnologiesinordertotransformtheirbusiness,chancesofriskanduncertaintyarealsogrowingalong withthem.Adoptingnewtechnologiesinbusinessprocessescouldalsobringsomeinevitableriskswiththem. Newcompetitors,regulatorycomplexity,naturalhazards,supplychainfailure,mechanicalbreakdown,cyber-attacksare somerisksthatcanoccurwithoutanypriornotice.Unmanagedriskscancreateahugeimpactondecisionsrelatedto investment,productdevelopment,sustainability,safety,etc.Thus,assessingsuchrisksandrespondingthemaccordingly becomesmandatoryastheycandestroysourcesofvaluecreationforthebusiness.Thisiswheretheneedforanintegrated approach,EnterpriseRiskManagement(ERM),generates.
Asbusinessrisksarecontinuallyincreasing,corporationsarefindingitmandatorytoimplementsomesortofrisk managementframework.AneffectiveERMprogramcannotonlyhelporganizationstomanagetheirrisksandmaximize opportunities,butalsocanstreamlinetheirbusinessprocessessoastoachievetheirorganization’sgoals.
Aftertheemergenceofthefourthwaveofindustrialrevolution,businesseshavecomethroughmanyrepercussions.The changescomprisingcoststructures,outdatedbusinessplatformandpractices,marketevolution,clientperception,andpricing pressuresoccurredhaveimpliedacertaindegreeofunknownrisksformanybusinesses.Thoughriskscanhave detrimental effectsonbusinesses,theyalsoactasanopportunitytoinstigatethechange,asbytakingariskcentricapproachbusinesses canformulateastrategyforsuccess.Hence,byincorporatinganintegratedapproach,EnterpriseRiskManagement(ERM), businessesareachievingtheirgoalsandobjectives,evenwhentheyencounterobstacles.Yet,manybusinessesarestill findingitdifficulttodealwithchangesdrivenbyfourthIndustrialRevolution.
Thepresentriskmanagementpracticesarelackingsuitabilitytointerpretriskssooner.Hence,inordertoenhancetheability toseeandunderstandriskywaves,manycompanieshavedevelopednewtoolsandtechniques.Byundertakinganew managementdiscipline,thesenewtoolsandtechniquesareenablingbusinessestoeasilypredictandrespondtothewavesof disruption.Businessesareabletocontinuouslymonitorthechangesintheenvironmenttodeterminewhichcouldbetruly disruptive.
Inordertoportraythesignificanceofaninnovativeapproachandframeworkinidentifyingrisks,InsightsSuccesshas enlisted“The10MostTrustedERMSolutionProviders,2019”,whichhavebuiltandaredeliveringagileandflexiblerisk managementframeworksthatenablebusinessestoanticipateandpreparefortheshiftsthatbringlong-termsuccess.
OurcoverstoryfeaturesZebu,acompanybasedoutofWaterloo,Ontario,knowntobethesecondfastestgrowingstartup communityintheworld.Zebuiscreatingasecurecloud-basedplatformforallbusinessmanagementneeds.Thecompany strivesforbusinessesofallsizestohavethebestmanagementandproductivitytoolsavailabletothem,withsecuritybeing thetoppriority.
Also,makesuretoscrollthroughthearticleswrittenbyoureditorialteamandCXOstandpointsofsomeoftheleading industryexpertstohaveabrieftasteofthesector.
Let’s start reading!
Though risk is an uncertain phenomenon, it can be used to fuel innovation.
“ “
Hitesh Dhamani
Runningabusinessisa complicatedtask.Thereare numerousfunctionsworking atthesametimeandeachandevery functionisinterdependent.Which means,delayinoneaspectofa businesswilldirectlyaffectthepace atwhichanotheraspectis functioning.Withtheweightofsuch activitiesalreadyputonits shoulders,itbecomesverydifficult foranenterprisetomanagedayto daytasks.Smallandmedium businessesareespeciallyaffectedby this,astheydon’thavetheresources toimplementheavysoftwareto manageeverything.
Tomeettherequirementsofsmall andmediumenterprises,Zebucame forwardwithitscomprehensive services,resolvingalltheissueswith itsall-in-oneapproach.
Withthevisiontohelpcreateaworld that’sfullofvibrant,diverseand prosperouslocalbusinesses,Zebu,a start-upinWaterloo,Canadawas created.Itisfocusedonhelpinglocal businessesthrivebyprovidingthem withtoolstoimproveteam collaborationandproductivity.Zebu existstohelpsmallbusinesses succeedintheirlocalcommunities.It buildstoolsthatallowsmallbusiness
ownerstospendlesstimemanaging theirbusinesses,allowingthemtoget backtotheirpassions.Itoffersa platformtohelpSmallandMedium Enterprises(SMEs)managetheir entirebusiness,includinganall-inonesolutionformessaging,storage andscheduling-allofwhichare encryptedtoprotecttheirdata.
TheservicesofferedbyZebumake runningthecompanyeasiersothat ownerscanfocusonwhattheydo bestwhilegrowingtheirbusiness. Thecompanybelievesthatmany smallbusinessesareundersiege fromlarge,globalbusinessesusing
advancedtechnologytogainefficiencies. Thesetechnologiesareoftentoo complicatedortooexpensiveforlocal businessestoembrace.Forthispurpose, Zebubuiltanall-in-oneproductivitysuite gearedspecificallytolocalbusinesses, aimedathelpingthemimprove collaborationandproductivityacrosstheir team,sothatbusinessownerscanfocuson whattheydobest.
JesseDavidThéistheFounderandCEO ofZebu.Hecameupwiththeideabehind Zebuwhileinhighschool.Hespentsome timelookingintowaystohelplocal businessesgetequippedwithmodern technologysothattheycouldbetteroperate andthrive.Hefoundaglaringgapinthe solutionsoffered.TheERPsolutionstohelp managebusinesseswereincredibly complex,hardtouse,andcumbersometo setup.Thereweresinglesolutionappsthat couldhelpmanageasingleaspectofthe business,butthisapproachofcoveringall theirneedsquicklybecametoo overwhelmingtomanagewhensomany appswererequiredtomanagethebusiness. WhattheseSMEsneededwasanall-in-one solutionthatwasaseasytouseasthesingle solutionapps.That’swheretheideafor Zebucamealong.
Speakingaboutcomingupwithnewideas, Jessebelievesthatmostoftheownersof smallormediumsizedbusinessesspendthe vastmajorityoftheirtimejusttryingto makesurethingsarerunning.Thistakes awayfromthetimetheycanspendcoming upwithnewideastoexpandtheirbusiness. Hestates,“Ifwecanhelpreducethe amountoftimeownersneedtospend managingeverything,theycangetbackto focusingongrowingtheircompanies.”
AccordingtoZebu,manyofthetoolsthat localbusinessesusetodayareisolatedfrom eachother.Messagingisdoneatoneplace, whileschedulingisdoneatanother.This forcesbusinessownerstochangetheway theyworkinordertoadapttothe technology.Asanall-in-oneplatform,Zebu bringstogetherthetoolsthatlocalbusiness
ownersrelyontokeeptheirbusiness runningsmoothly.Onegreatexample isthatitssecurityandencryptionjust happenautomaticallyinthe background,withoutanyspecific actionsrequiredbytheuser. Encryptingafilelikeacustomer orderorfinancialspreadsheetisas simpleasdragginganddroppingit intoZebu.
OnthatnoteJesse asserts,“Whenit comestoyourcompany’s communication,financials, intellectualproperty,human resources,andrelatedactivities, confidentialityiscritical.Zebugives thematransparentlayerofsecurity. Also,whilemostsoftwarecompanies thatcreatebusinesstoolshavebuilt theirbusinessmodelsaround scanningandsellinguser information,Zebuusesencryption thatmeanswehavenowaytoreada customers’messagesoraccesstheir information.”
Zebuoffersvariousotherservices includingSecureTeamMessaging, allowingclientstohaveinstant communicationandlongform discussionsfromanywhereinthe world;CloudStoragefortheentire team,providingallmembersaccess toasecurecloudstoragesystem allowingthemtopullthefilesthey needfromanywhereintheworld. Everyteammemberhasaccesstoa personalcalendarthatcanbeshared withothers,makingiteasytoplan aroundpeople’sschedules.Theycan alsoseteventsasprivatetoensure thatsensitivemeetingsandevent informationiskeptwithonlycertain individuals.
Zebu’sinitialtoolwasadispatchand servicerequestsystemtohelplocal taxicompaniescompetewithUber, andalsohelpotherdelivery companiesmanagetheirfleet.Its transportapphadtheflexibilitytobe
ataxihailingappandan“object”deliverysystem.While creatingthistool,andworkingwiththesecompanies, Zebuperceivedthatoneofthebiggestissuestheyhad wasalackofpropercommunicationandscheduling tools.Hencethecompanydecidedtoaddthosefeatures totheinitialplatforminordertohelpthecompanies communicateandscheduleordersandrides.
Onceitbecameclearthattheneedsfortheseservices wasfargreaterandexistingplatformscouldnotdelivera compellingsolution,Zebushifteditsfocusentirelyto thosetoolswiththeadditionofcloudstorageandfile management.Zebu’scompetitioniscomposedofdozens ofsingle,point-solutionappsthatonlyhelpwithone thing.Itintegratesallbusinessaspectsintoasingleeasyto-useapplication,makingsingle-functionbusinessapps irrelevant.
ZebuiscontinuouslybuildingupitsCloudplatformthat intelligentlyconnectsallaspectsofbusinessina streamlinedmodularERPsystem.Zebuprovidessmall tomediumsizedenterprisesacrossnumerousgoodsand servicesindustriesaccesstothehighestqualitytools availabletothem. Thisenablesthemtothriveinthe21st century.
Zebuhasambitiousplansforthefutureofitsplatform. Itwillre-shapethewaylocalbusinessesaroundthe worldoperate.Itstartedwithcommunication,storage, andscheduling,butwillsoonaddadditional functionalitytosupportbusinessesacrossalltheirneeds.
“We were looking for an application that would do a better job than just messaging. We had issues with the previous message app, where we had to manually take care of simple task requests in the message. For example, messages would request meeting dates, and we would have to exchange dozens of text messages to define common availability. Zebu just automatically creates polls. We would receive dozens of files, which were hard to find later when we really needed them. Zebu has a clever organization of files, where we always find them. We also love the fact that everything is encrypted to guarantee our intellectual properties are protected.” –EduardoPereira,President,Redesa.
Theriseincyber-crimesisoneofthemaincausesof Datacenteroutages.Aspertherecentsurvey conductedbyindustryinsiders,cyber-crimecaused 22percentdatacenteroutagesin2015opposedto2percent outagesin2010.Addingtoallthese,nowmostofthedata centersarere-evaluatingtheirsecuritypoliciesafterthe recentWannaCryransomwareattack.
Datacenteroutagescausecompaniestolossrevenuein manyways.However,thecostliestlossisservice interruptionandlossofITproductivity.So,the organizationsarenowrealizingthattraditionalsecurityis nolongersecureenoughtosecureanydatacenter.Arecent studyhasfoundthat83percentoftraffictravelseast/west withinthedatacenter,whichstaysundetectedbythe perimetersecurity.Inthisenvironment,whenanattacker infiltratestheperimeterfirewall,thencanjumpacrossthe systemwithease,extractinformationandcompromise valuabledata.Additionally,datacenterscanfaildueto trespassersoraterroristattackorbynaturalcalamities.
So,howcanonesecureadatacenterinthebestway possiblefromanykindofcyberthreat?Don’tworrywe’ve gotyoucovered,withthepointsbelow.
Asthefirststep,oneshouldMaptheDataCenterandflag thehackerswithinthevirtualandphysicalinfrastructure. TheCSOsandCIOswithasystemmapoftheirsystems canreacttoanysuspiciousactivityandtakestepstostop databreaches.Beingabletovisualizedifferenttraffic patternswithinanetworkhelpstounderstandthreats,that eventuallyelevatesthelevelofsecurity.
Understandingandmeasurementoftrafficflowwithin thedatacenterboundaryareveryimportant.Inthecaseof
anyinterruptionintrafficacrosseast/westvsnorth/south, protectedvsunprotectedonecangettoknowaboutathreat. Additionally,vulnerablezonesandunprotectedtrafficneed tobemonitoredforabetterresult.
Firewallrulesneedtobedefinedandimplementedasper requirements.Additionally,oneshouldallowtrafficonly afterthoroughverificationandselectivelyallow communicationtoensuremaximumprotection.Thekeyis toidentify,whatislegalandsecuredandwhatcanbe blockedtoenhancesecurity.
OneneedstoBuildaTeamwithexecutiveswho understandhowtrafficflowswithinthepremisesandcan access&secureinformation,takenecessarymeasuresto secureimportantassetsalongwiththeimplementationof roadblocksfortheattackers.
Securitymustmoveasfastasadatacenter’stechnology adoptionandintegration.SecurityStrategyShould ChangeAlongsidetheTechnologyanditshouldnotbe treatedasanadd-onoption.Additionally,businessesalso shouldensurethattheirvirusprotection,signaturesother protectionfeaturesareuptodateforbetterprotection.
BusinessesshouldIdentifyandPlaceControlsoverhighvalueassets,whichwillhelptoreducerisk.However,older securitysolutionsarecompletelyblindtonewthreats,new securitycompanieshaveproducedlatestsolutionsthat protectdatainthevirtualworld.
AccessRestrictionalsoneedstobeimposed.Every businessshouldthoroughlycheckaperson’sbackground beforegivingtheaccesstoaprizedpossession.Accessto themainsiteandtheloadingbaymustbelimited,
additionally,two-factorauthenticationsandfortifiedinteriorswithsecurityguardsandrovingpatrolswouldhelpto safeguardtheemployeesandthedatacenter.
InstallingSurveillanceCamerasaroundthedatacenter,alongsideremovingsignswhichmayprovidecluestoitsfunction helpstolocateanintruder.Abufferzonebetweenthedatacenterandalltheentrypointswilllimitunlawfultrespassingtoa greatextent.Additionally,thedatacenterneedstobefarawayfromthemainroadanditshouldnothaveanywindowsother thanadministrativepurposesforbettersecurity.
AdatacentershouldCheckTestBack-UpSystemsregularlyasprescribedbythemanufacturer.Itshouldalsoensureto makealistandofDo’sandDon’tsintheeventofanattack.Recoveryplansandsecurityplansalsoneedtobechecked thoroughly.
DatacentersarealwaysaSoftTargetforTheTerrorists,asanattackonthemcandisruptanddamagemajorbusinessand communicationinfrastructure.So,securityneedstobetakenseriouslyandtodothatproactivestepsshouldbetakentolimit theimpactofaterroristattack.
TrainedSecurityGuardsneedstobepostedinsideadatacenterandtheyshouldbewelltrained.Securityofficersmust undergostrictsite-specifictrainingtomonitorsurveillancefootage.Dependingonthesizeofdatacenterandthenumberof securitycamerasmultiplesecurityofficersmayberequiredonduty. Securityofficersdedicatedtoinspectingsurveillance footagehelpswhenitcomestosecuringadatacenter.
DisasterRecoveryisverymuchimportant,thatmustbeinplace.Ifthedatacenterstopsfunctioningafteranattackor naturalcalamity,itmusthaveawaytorestoreoperationsassoonaspossible.Tobereadyforadisasterandtoevaluatethe disasterrecoveryplan,it’snecessarytotrainstaffswellandexperiencesimulateddisasters.
Toavoidtheseobstacles,oneneedsafairbitofknowledgeofnewsecuritysystems,solidplans,andcomprehensive visibility.Themoreworkadatacentercandoupfrontintheabove-mentionedareasthebetterthechancesofsuccesswith lesseroutages.
WithincreasedusageoftheWorldWideWeb, securitybreachesarebecomingamore commonoccurrencenowadays.Thepast coupleofyearshavewitnesseddetrimentalsecurity breachestothecommonpublic,multinational organizationsandsmallcompaniesalike.
EntertheColorado-basedcybersecurityadvisoryfirm Coalfire,whichhelpsprivateandpublic-sector organizationsavertthreats,closegapsandeffectively managerisk.Theorganizationhelpsitsclientsdevelop scalableprogramsthatimprovetheirsecurityposture, achievetheirbusinessobjectivesandfueltheircontinued successbyprovidingindependentandtailoredadvice, assessments,technicaltestingandcyberengineering services.
It’sAllaboutQuality Coalfireemploysaprocess-drivenqualitymanagement systemthatensureseffectiveandrepeatableproject, staffingandcontractmanagementactivitiesbasedon CapabilityMaturityModelIntegration,Project ManagementBodyofKnowledge,andISOstandardsas wellasindustrybestpractices.
Throughanemphasisonefficiencyandquality,Coalfire strivestoimproveitsclients’experience,refineproject metricsanddeliverunparalleledresults.Thecompany preferstokeepitsfocusonaconsistentapproachto deliveryandcontinuallyimproveallCoalfireservices throughevaluation,internalauditandinternalcorrective andpreventivemeasures.
Coalfireadvocatesforcreatingariskregisterwhereeach riskisdescribed,itsseverityisdetermined,ownership forriskmitigationisdefinedandriskmitigationtactics areclearlyarticulated.Thisriskregistershouldbe
updatedatleastmonthly,includingprogressreportson allexistingrisksalongwithanynewrisksthatmustbe considered.Ariskcommitteeshouldthenreviewthe registermonthlytotrackstatusontheexistingandnewly identifiedrisks.
AccordingtoCoalfire,theprimarycategoriesofrisk organizationsshouldconsiderinclude: Ÿ
Strategic:Doesariskposeathreattothesuccessof keystrategicinitiatives? Ÿ
Financial:Theunplannedcostsorreductionof revenueariskcouldpresentifrealized Ÿ Operational:Doesariskposeathreattohowwork getsdone? Ÿ
People:Agingworkforce,talentgapforneededskills, healthandsafety,riskculturenotwellestablished
Reputation:Willtheorganizationsufferdamagetoits credibilitywiththepublicorotherstakeholders;will itimpactcustomerloyalty/retention? Ÿ
Technology:Exposeskeyinfrastructure/datato theft/loss,cyberthreats,impactofuseofnew technologysuchascloud,AI/machinelearning,big dataanalytics Ÿ
Legal:Risktriggerslitigation,contractualrisks Ÿ
Regulatory/Compliance/Privacy:Failuretocomply canresultinlargefines.ExamplesincludeHIPAA, PCI,GDPRandthenewCaliforniaConsumer PrivacyAct Ÿ
Regulatoryoverreach:Toomuch (overlapping/competing)regulationleadsto confusion,overspendingandlackofabilitytokeep upandcomply.
TomMcAndrew,theCEOofCoalfire,hasover15 yearsofleadershipexperienceininformationsecurity
strategies,assessmentandauditforbothcommercialand federalsectors.Hejoinedtheorganizationin2006,and sincethenhasheldkeyleadershiprolesspanningSales, ServiceDeliveryandTechnicalTesting.
BeforejoiningCoalfire,Tomdesignedinformation securityandweaponssystemsforSpaceandNaval WarfareCommand,NavalSeaSystemsCommandand theU.S.Navy.Hebringsallthisexpertisetohis leadershipposition,overseeing,inahands-onmanner, howthecompanyhelpsenterprisesidentifyandmanage risks.
Coalfire’smissionisexclusivelyfocusedonenterprise riskreductionandmanagement;Tomandtheentire leadershipteamarefocusedondirectingtheorganization towardhelpingcustomersachievetheseaimsefficiently andeffectively.Heisahighlyvisiblethoughtleader, presentingfrequentlyinprivateandpublic-sector speakingforumsandcontributingarticlesand commentaryinthemedia,includingtheWallStreet Journal,WashingtonPost,InfosecurityMagazineand manyothers.
Duringitsinitialdays,Coalfire’sbusinesswasformedto helporganizationscomplywithemergingdatasecurity regulations,suchasthoseimposedintheheathcareand financialservicessectors.Althoughcompliancetothe ever-expandinglistofdataprivacyregulationsremains vitaltoCoalfireanditsesteemedclients,theindustry nowrecognizesthat“compliancedoesnotequal security,”andCoalfire’sserviceshavethusevolvedto meetthisrecognition.Asaresult,theorganizationhas expandedfromacompliancefirmtoonethatoffersafull
suiteofcybersecurityservicesdesignedtohelpitsclients identify,mitigate,andrespondtocyberrisks.
Coalfirebelievesthatrapidlychangingtechnologies, suchasthecloud,combinedwiththeever-evolving cyberthreatlandscaperequiresorganizationstoview cyberrisksasacriticalbusinessissueandnotjusta concernrelatedtoIT.Astechnologiesandthreats continuetochange,Coalfireseesacontinuousneedto monitorcyberrisks,leveragingtoolsandkeybusiness partnerswherepractical,inlieuofjustadding cybersecurityprofessionals,whoareincreasinglyin shortsupply.
DevelopingaCultureofSecurity Coalfirebelievesadequatelyidentifyingandprioritizing risksshouldbeginwiththedevelopmentofagovernance structure,whichshouldbeariskcommitteeandneedsto bechairedbyCISOorequivalent.
Accordingtothecompany,itisimportanttodevelopa cultureofsecuritywhereemployeesareallencouraged toreportissuestheyseethatposepotentialrisktothe organizationwithoutanyfearofreprisal,butratherwith theblessingandencouragementofseniorleadership. Thesupportoftheboardand/orexecutivemanagement iscritical;theyneedtoclearlyarticulatetheimportance ofsecurityandreportingrisksthroughoutthe organization.
“Coalfire not only helps you understand risk, but also empowers you to manage it effectively.”
Gisle M. Eckhoff joined DigiPlex in August 2014 as Chief Executive Officer. He brings nearly thirty years’ experience in senior positions in the IT industry in the US, Sweden, UK and Denmark as well as at home in Norway. Gisle is the former Senior Vice President and Managing Director of CGI’s operation in Norway, and has also held a number of senior management roles at both country and regional levels in CSC Computer Sciences Corporation.
The experience and knowledge gained from heading up the Financial Services vertical in the Nordic region, before becoming Vice President and Managing Director of CSC in both Norway and Sweden, is of great value when implementing DigiPlex’ growth strategy in the Nordic markets.
TheEU’sGDPRlegislaturewillhaveconsequencesforeverycompanydoingbusinessin
Europe,includingAmericancompanies.Thenewdirectivepromisessizeablefinesto anyonethatdoesnottakepersonaldataseriously.Meanwhile,thedatacentrecompany DigiPlexurgescompaniestofocusonanotherimportantaspect:physicalsecurity.
TheGeneralDataProtectionRegulation’s(GDPR)purposeistoharmonizelegislationrelatedto personalinformationacrosstheEU’smemberstates.Itdoeshoweveralsocreateradicalchallenges forAmericanbusinessesholdinginformationonEUcustomers.ComeMay2018,whenthe legislationentersintoforce,companieswillhavepubliclydisclosedhowthedataisused,inaddition toofferingtransparencyforindividualsseekingaccesstotheirdata.TheGDPRincludesasanction mechanism,andthefinesfornon-compliancecanreach4percentofacompany’sannualrevenue.
• Business will obviously change for everyone not taking personal information seriously. This will clearly raise awareness regarding how the data is secured, but it’s also vital not to forget where the information is located, saysDigiPlexCEO,GisleM.Eckhoff.
Americancomputersecuritycompany,McAfee,publishedastudyofover800companyleadersfrom differentsectors.Thereportrevealsthat50percentoftherespondentsstatethattheywouldliketomove theirdatatoamoresecurelocation.AmotivatingfactoristhenewEUlegislation.Thereportalso revealsthat74percentofthebusinessleadersspecifiedthattheythoughtprotectingthedatacorrectly wouldattractnewcustomers.
• Data security is not just about protecting yourself against hacking and other digital threats. The overall security critically depends on where your data is stored. Companies who actively select a secure data centre to host their data will gain a competitive advantage in the market as the management of personal information is in the spotlight, saysEckhoff.
WhileEU-basedcompaniesareintheprocessofadaptingtotheGDPR,Gartnerpredictedonly50 percentofAmericanfirmswillbereadyforthestrictregulationbytheendof2018.It’sprimarilythe largestcompaniesandpublicenterprisesthatarefurthestalongintheprocessofadaptation.According toEckhoff,theyareusuallytheonesthatarethemostconcernedwithdatasecurityandwhereitis stored.Fireandoperationalsafetyaretwoobviouschallenges,butphysicalsecurityalsoincludes securingyourselfagainsttheft.
• Several smaller businesses and organizations keep their data servers at their o ces, and the physical security in many of the smaller data centers is almost absent. If your data is stored in such a data center, where someone easily could break in and physically remove the hardware containing your information, then you are very vulnerable – both operationally and in relation to GDPR, saysEckho .
AtDigiPlex’sdatacenters,severallayersofsecurityensurethesafetyofthedataandthepersonal informationthatisstoredthere.Physicalsecurityisoneofthemostcomplicatedandexpensivefeatures whenbuildingorupdatingadatacenter.Thatiswhynewlyestablisheddatacentershavetoreach criticalmass,allowingthemtostoreenoughdatatocompensateforthelargesecurityinvestment.
Oneconsiderationtotake,aswearegettingclosertotheimplementationdateofGDPR,iswhereyour datacentershouldbelocated.SeveralUSbasedcompaniesarealreadyrelocatingtheircenterstotheEU inordertocomply.Multipledatabaseprovidersarehelpingnon-EUcompaniesorganizeandsegregate EUdatafromotherpersonalinformation.ThedatacenterindustryiswellestablishedinEurope,and someofthemostcostandclimateefficientcentersarelocatedintheNordiccountries.
IntheNordics,thecoolclimatehelpschilldownvastamountsofhardwarethatotherwisewouldhave beencooleddownsolelybyelectricity.Additionally,theelectricitythatisrequiredbydatacenterstorun theiroperationsissuppliedthrougheasyaccesstoaffordablerenewableenergy.
• In recent years, we have seen political turbulence in larger parts of the world, Europe included. The stabile political environment in the Nordic countries is also a climate to consider, as the establishment of data centers is a long-term investment, saysEckhoff.
November3,1988,isconsideredasaturningpoint
intheworldofInternet.25YearsagoaCornell Universitygraduatestudentcreatedfirstcomputer wormontheInternet,“MorrisWorm.”TheMorrisworm wasnotadestructiveworm,butitpermanentlychangedthe cultureoftheInternet.BeforeMorrisunleashedhisworm, theInternetwaslikeasmalltownwherepeoplethought littleofleavingtheirdoorsunlocked.Internetsecuritywas seenasamostlytheoreticalproblem,andsoftwarevendors treatedsecurityflawsasalowpriority.
Today,thereisaparadigmshift,Morriswormwas motivatedmorebyintellectualcuriositythanmalice,butit isnotthecasetoday.Accordingtoa2015Report,71%of representedorganizationsexperienced,atleast,one successfulcyberattackinthepreceding12months(up from62%theyearprior).
Accordingtosurveyreport,disclosesthat,among5500 companiesin26countriesaroundtheworld,90%of businessesadmittedasecurityincident.Additionally,46% ofthefirmslostsensitivedataduetoaninternalorexternal securitythreat.OnaverageenterprisespayUS$551,000to recoverfromasecuritybreach.SmallandMediumbusiness spend38K.
Incidentsinvolvingthesecurityfailureofathird-party contractor,fraudbyemployees,cyberespionage,and networkintrusionappeartobethemostdamagingforlarge enterprises,withaveragetotallossessignificantlyabove othertypesofthesecurityincident.
Adenialofservice(DoS)attackisanincidentinwhicha userororganizationisdeprivedoftheservicesofaresource theywouldnormallyexpecttohave.Theseattacksarevery common,accountingformorethanone-thirdofallnetwork attacksreviewedinthereport.Astandardapproachisto overloadtheresourcewithillegitimaterequestsforservice.
Bruteforceattacktriestokickdownthefrontdoor.It’sa trial-and-errorattempttoguessasystem’spassword.The BruteForceAttackpasswordcrackersoftwaresimplyuses allpossiblecombinationstofigureoutpasswordsfora computeroranetworkserver.Itissimpleanddoesnot employanyinventivetechniques.
IPspoofing,alsoknownasIPaddressforgery.Thehijacker obtainstheIPaddressofalegitimatehostandalterspacket headerssothattheregularhostappearstobethesource.An attackermightalsousespecialprogramstoconstructIP packetsthatseemtooriginatefromvalidaddressesinside thecorporateintranet.
Browser-basedattackstargetenduserswhoarebrowsing
theinternetwhichinturncanspreadinthewholeenterprise network.Theattacksmayencouragethemtounwittingly downloadmalwaredisguisedasafakesoftwareupdateor application.Maliciousandcompromisedwebsitescanalso forcemalwareontovisitors’systems.
Transportlayersecurity(TLS)ensurestheintegrityofdata transmittedbetweentwoparties(serverandclient)andalso providesstrongauthenticationforbothsides.SSL/TLS attacksaimtointerceptdatathatissentoveranencrypted connection.Asuccessfulattackenablesaccesstothe unencryptedinformation.SecureSocketsLayer(SSL) attacksweremorewidespreadinlate2014,buttheyremain prominenttoday,accountingfor6%ofallnetworkattacks analyzed.
NetworkSecurityisanessentialelementinany organization’snetworkinfrastructure.Companiesare boostingtheirinvestmentsinproactivecontrolandthreat intelligenceservices,alongwithbetterwirelesssecurity, next-generationfirewallsandincreasinglyadvanced malwaredetection. The U.S. Federal Government has spent $100 billion on cyber security over the past decade, $14 billion budgeted for 2016.
Increaseduseoftechnologyhelpsenterprisestomaintain thecompetitiveedge,mostbusinessesarerequiredto employITsecuritypersonnelfull-timetoensurenetworks areshieldedfromtherapidlygrowingindustryofcyber
crime.Followingarethemethodsusedbysecurity specialiststofullproofenterprisenetworksystemPenetrationTesting
Penetrationtestingisaformofhackingwhichnetwork securityprofessionalsuseasatooltotestanetworkforany vulnerabilities.DuringpenetrationtestingITprofessionals usethesamemethodsthathackersusetoexploitanetwork toidentifynetworksecuritybreaches.
Intrusiondetectionsystemsarecapableofidentifying suspiciousactivitiesoractsofunauthorizedaccessoveran enterprisenetwork.Theexaminationincludesamalware scan,reviewofgeneralnetworkactivity,system vulnerabilitycheck,illegalprogramcheck,filesettings monitoring,andanyotheractivitiesthatareoutofthe ordinary.
NetworkAccessControlsaredeliveredusingdifferent methodstocontrolnetworkaccessbytheenduser. NACs offeradefinedsecuritypolicywhichissupportedbya networkaccessserverthatprovidesthenecessaryaccess authenticationandauthorization.
NetworkSecurityisaraceagainstthreats,andmany organizationsareapartofthisracetohelpenterprisesto
securetheirnetworksystems.OrganizationslikeIBM,Symantec,Microsofthavecreatedsolutionstocountertheglobal problemofnetworksecuritythreat.Thesecutting-edgeproductsshowgenuinepromiseandarealreadybeingusedby enlightenedcompanies.
Targetedattacksaremulti-facetedandspeciallydesignedtoevademanypointtechnologiesattemptingtoidentifyand blockthem.Oncetheyareinside,theonlywaytofindthesecyberthreatsistounderstandthebehavioroftheindividual attackcomponentsanduseanalyticstounderstandtheirrelationships.
Todayitisnotimportantthatanorganizationwillbeattacked,butimportantandmorecrucialistoidentifywhenand howmuchtheycanlimittheimpactandcontaintheirexposure.Thismeanshavingthecapabilitytorespondquickly oncetheinitialincidenthasbeendiscovered.
Malwareisgettingsquick-witteddaybyday.Theyutilizeheuristicstochangetheircodedynamically.Acapable solutionshouldhaveanadaptivearchitecturethatevolveswiththechangingenvironment,andthreatstoday’sbusiness faces.
Today’sthreatshavemultiplefacets,andasinglesoftwareorsolutionisnotsufficient.Protectionsystemshouldhave thecapabilitytointegratewithothersecuritytoolsfromdifferentvendorstoworktogetherasasingleprotectionsystem, actingasconnectivetissuefortoday’sdisjointedcybersecurityinfrastructure.
Likeinfectiousdiseases,cyberthreatswillneverbeeradicatedentirely,buttheycanbebettercontainedandunderstood, andtheireffectsminimized.Howcanthisbeachieved?IBMhasbuiltanenterprise-level“immunesystem,”anadaptive securityarchitecturetobattletoday’scyberpathogens.IBMhasdevelopedavastfleetofproducts,QRadar,X-Force ThreatIntelligence,TrusteerPinpointMalwareDetection,IBMThreatProtectionSystemadynamic,integratedsystem tomeddlethelifecycleofadvancedattacksandpreventloss.
TheIBMThreatProtectionSystemintegrateswith450securitytoolsfromover100vendorsactingasconnectivetissue fortoday’sdisjointedcybersecurityinfrastructure.
SymantecisanothermajorplayerincateringenterprisenetworksecuritysystemswithSymantecAdvancedThreat Protection.SymantecATPoperatesviaasingleconsoleandworksacrossendpoints,networks,andemails,integrating withSymantecEndpointProtection(SEP),andSymantecEmailSecuritycloud,whichmeansorganizationsdonotneed todeployanynewendpointagents.Symantecsays,ATPistheonlythreatprotectionappliancethatcanworkwithall threesensorswithoutrequiringadditionalendpointagents.WithATP,Symantec’sgoalistodeliverend-to-endthreat protection,prevention,detection,andresponseinasinglepaneofglass,offeringmorevaluetobusinessesthan individualpointproductscanprovide.SymantecAdvancedThreatProtectioncombinesmultiplelayersofprevention, detection,andresponse.
Thecomplexitiesthatcomewithtoday’sincreased digitizationareever-apparent,andtheriskofcyberattacksisgrowingexponentially.Recognizingthis, BostonbasedCyberSaintSecurity,aleadingcybersecurity softwarefirm,helpsorganizationsmanagecybersecurity risksthroughitsflagshipCyberStrongintegratedrisk management(IRM)platform.Theplatformwasbuiltbya teamwhoseintellectualDNAwindsdeeplythroughthe academic,techandinvestmentcommunitiesinBoston,the WhiteHouse,RSA,IBM,EMC,KPMG,MIT,Harvardand others.CyberSaint’smissionistoempower organizationstomanagecybersecurityasabusiness functionthroughtheadoptionofpowerfultechnology thatenablesmeasurement,enhancescommunication andimprovescybersecurityresiliency.
TheCyberStrongPlatformisanintegratedrisk managementsolutionpoweringautomated,intelligent cybersecuritycomplianceandriskmanagement.Builton thegold-standardfoundationoftheNISTCybersecurity Framework,CyberStrong’scapabilitiesstreamlineGRC activitiesandprovideasinglepaneofglassthroughwhich CISOsandtheirsecurityteamscanmeasure,report,and mitigaterisk.CyberStrong’sunparalleledtime-to-value, breakthroughArtificialIntelligenceandMachineLearning automationeliminatemanualeffortandhelporganizations makeinformeddecisionsthatreduceriskwhiledriving overallbusinessvalue.
GeorgeWrennistheFounderandCEOofCyberSaint Security,exhibitingover20+yearsofcomprehensive experience.Priortohiscurrentrole,hewastheCSOand VPofCybersecurityforSchneiderElectric,aFortune500 globalpowercompany.Prior,Georgewasasenior managingconsultantwithIBM,helpingcross-industry Fortune1000customersreachcompliancetoNIST, FISMA,ISO/IEC,HIPAA,PCI,NERC/CIP,andotherkey
regulatoryframeworks,developingcybersecuritystrategy, roadmaps,andglobalcybersecurityprograms.Tilldate,he hascollaborated,reviewed,andaddedvalueinthe developmentofframeworksandstandardssuchastheNIST CybersecurityFrameworkandothers.
GeorgeisagraduatefromHarvardUniversityandhas attendedexecutiveprogramsatHarvardBusinessSchool andtheHarvardKennedySchool.AsaGraduateFellowat MITforoveradecade,heconductsresearchandadvanced courseworkattheMITMediaLab,theSloanSchoolof Management,theSchoolofEngineering,theSchoolof ArchitectureandmostrecentlytheMITSecurityStudies programworkingonCyberWarfareframeworks.Heisalso anAffiliateandResearcheratMIT’sExecutive DevelopmentprogramspecializingintheNIST CybersecurityFramework.
Georgeisaseasonedkeynotespeaker,andhasspokenat theinauguralNISTCybersecurityRiskManagement ConferenceonIoTSecurityandDigitalRiskManagement. HehasalsohadanNSAsponsoredISSEPcredential,a CertifiedEthicalHackerandCISSPformorethan12years. GeorgehasexperienceworkingwiththecomplexCloud, Government,IT,ICS,auditandnationalregulatory frameworks.HewasalsoamissionorientedOperations OfficerandSAR/DRPilot(Officer1stLt.USAF/Aux) whereheservedas1stlieutenant,andhasreceiveda NationalCommander’sCommendationAwardfor outstandingdutyperformancewiththeHanscomComposite Squadron(HCS-MA-043)basedatHanscomAirForce Base.
TheCyberStrongplatformautomatesthemanual assessmentprocessesthatdeterorganizationsfromrapid adoptionofgoldstandardssuchastheNISTCSF.The platformsupportsISO27001/2,GDPR,COBIT,IEC62443,
andanyotherframework-includingcustomcontrolsand hybridframeworks.CyberStrong’sproprietarycontrol optimizationusespatentedmachinelearningandartificial intelligenceforfasterriskmanagementdecisionmaking andautomatedriskmitigationactionplanning.CyberStrong ingestsitsclient’sassessmentdatatoproviderisk quantificationandanalyticsthatidentifytheircurrentgaps, andmapsthisdataacrosspeople,process,technology,risk, andcosttoprovideanoptimizationthatidentifieslowhanging-fruitopportunitiestomitigateriskforthelowest costandhighestimpactontheirposture.
Thispatentedoptimizationencourages‘always-on’ continuousimprovement,andiscompletelyautomatedin real-time,requiringzeromanualefforttoproducefully customizedmitigationplans.Inaddition,CyberStrong’s integratedthreatfeedautomatestheprioritizationof controlsforremediationbasedonreal-timedetectionof threatsthatappearactiveatanytime,foranyassessment. CyberSaintbelievesthatby2020,100%oflargeenterprises willbeaskedtoreporttotheirBoardofDirectorson cybersecurityandtechnologyriskatleastannually,whichis anincreasefromtoday’s40%.AccordingtoGartner,as enterprisestakeholderstakeanincreasinginterestand concernaboutthesecurityposture,theCISOneedstobe abletoconveytheiractivitiesandsuccessaseffectivelyasa CFOcanwithabalancesheetandstatementofcashflows.
Thisapproachwillensurethatallleaders,inevery departmentregardlessofsecurityexpertise,canunderstand theenterprise’sriskposture,whataffectsit,andwhattobe awareof.Therearefourrecommendedreportsnecessaryto helpyoualignyouractivitiesasaCISOwiththegoalsand objectivesoftheenterprise:ExecutiveRiskReport,Trend
Report,GDPRReport,andGlobalReport-allwhichare automatedfromwithintheCyberStronginterfacewithno humaneffortrequired.CyberStrongallowsCISOsto effectivelycommunicatetheirstrategiesinawaythatis universallyunderstood.
“CyberStrong provides me with a means to effectively measure and communicate our overall compliance posture, AI to model my security investments for the best ROI, and information on risk exposure using an industry standard model paired with innovative technology. Bright Horizons management can now evaluate clear gaps and work with my team to manage risk across the enterprise.” JavedIkbal, CISOandVPofInformationSecurity,RiskManagement& ComplianceatBrightHorizonsFamilySolutions(NYSE: BFAM)
“CyberStrong provides an easy-to-use platform for us to maintain our compliance with the new DoD DFARS regulation. The team from CyberSaint got us up and running very quickly and now we manage our DoD compliance on our own.” AnthonySantagati,CFOat Senior(SeniorPlc-LSE:SNR)AerospaceMetalBellows.
“The CyberStrong Platform's breakthrough technology augments and enhances every element of your cybersecurity program strategy, posture and potential.”
Nearly95percentofallsuccessfulattackson enterprisenetworkstargetedorganization’susers throughemail.Withtheindustryofcybersecurity evolvingsorapidly,hackersareconsistentlychangingtheir tactics,keepingitalmostimpossibletokeepupwith.
Withtoday’sgrowingsecuritylandscape,emailthreatsare oneofthemostcommonstrategiesutilizedbycyber criminals.Whatstartedoffwithspamemailssenttoyour junkfolder,hasevolvedtoamorerobusttactictodeliver destructivecontentstraighttoyourinbox.Herearethetop fiveemailsecuritythreatsthatwe’veseensofarthisyear:
Emotetisanadvanced,modularbankingTrojanthat primarilyfocusesasadownloaderordropperofother bankingTrojansandcontinuestobeamongthemostcostly anddestructivemalwareaffectinggovernments,privateand publicsectors.Emotetcanevademostsignature-based detections,andbecauseitisVirtualMachineaware,it generatesfalseindicatorswhenraninasandbox. Additionally,Emotethasseveralmethodsformaintaining persistence,includingauto-startregistrykeysandservices aswellasDynamicLinkLibrariestocontinuouslyupdate andevolveitscapabilities.
Initialinfectionofthismalwareoccurswhenauseropens orclicksamaliciousdownloadlink,PDF,ormacro-enabled MicrosoftWorddocumentincludedinthemalspam.Once downloaded,Emotetestablishespersistenceandattemptsto propagatelocalnetworksthroughoneofitsincorporated
spreadermodules.Thenegativeconsequencesfroman Emotetinfectioncanbetemporaryorpermanentlossof sensitiveproprietaryinformation,disruptionofregular operations,financiallossesincurredtorestoresystemsand files,andpotentialharmtoanorganizationsreputation.
AnewversionoftheinfamousbankingTrojanUrsnifmade itsappearanceagainearlierthisyearinJune.Thismalware iswellknowninthecybersecuritycommunityandwasthe mostactivemalwarecodeinthefinancialsectorfromthe endof2016intoearly2017.Thismalwareiscapableof stealingusers’credentials,credentialsforlocalwebmail, cloudstorage,cryptocurrencyexchangeplatformsand e-commercesites.
OnceUrsnifinfectsanewmachineitwillattempttospread tootherusersintheaddressbookofthecompromisedemail accounts.Ittricksthevictimintoopeningthemalicious emailbecausethemessageispresentedasthereplytoan existingconversationconductedbythevictiminthepast. Forexample,ifyoureceiveanemailthatwasareplaytoa previousconversationfromawhileback,youcanlookat the“To:”fieldintheemailandseeifit’srepliedtoalarge numberofunsuspectingusers.
Anotherfeatureaboutthismalwareisitsabilitytokeep trackofcompanynamesandtitlethemaliciousdocument “VICTIM_COMPANY_.doc”inordertolooklegitimate. Oncethevictimclicksenablemacros,thesecondstepof theinfectionprocessbegins,whichlaunchesamalicious
scriptthatdownloadsandexecutesapayloadfromaserver controlledbytheattackers.Onceinstalled,Ursnifcan operatewithoutbeingnoticedbyboththeuserandthe operatingsystem.
Extortioncampaignshavebeenaroundforquitesometime buttherewasonethatwasinfullswingacrosstheglobe thatusedaclevertwisttotrickunsuspectingusersinto payingaransom.Theattackerforthisextortioncampaign claimstohaveinstalledmalwareonyoursystemandhas alsousedyourwebcamtorecordyouwatchingporn.The attackerthengoesontothreatenthereleaseofthisvideoto everyoneinyourcontactsunlessyoupaytheBitcoin ransom.
Thebasicpremiseofthistypeofextortionattempthasbeen aroundforquitesometime,buttheadditionofthe Username/Passwordcombinationinthesubjectlinehas unsuspectingusersworried.Whileresearchingthis campaign,Nuspire’sSecurityAnalyticsTeam(SAT)came acrossmultipledifferentcountsofaffectedusersclaiming theUsername/Passwordcombinationwassomethingthey hadusedeightyearsago.Inthiscase,theattackerhas somewhatautomatedtheattacktocreateascriptthatpulls directlyfromusernamesandpasswordsofagivendata breachthathappenedeightyearsago.Therefore,every victimwhohadtheirpasswordcompromisedaspartofthat breach,isnowgettingthissameemailattheaddressthey usedtosignupforthehackedwebsite.
Hopefully,ifyouwereaffectedbythatdatabreachyou updatedyourusername/passwordcombination.Granted,the peoplewhodidn’tbotherchangingthisinformation,this attackdirectlyaffectsthem,butrestassuredthisattacker doesn’thavearecordingofyouthattheyplantosendoutto yourcontacts.Itismerelyscaretacticstomakesomeeasy money,anduponinvestigationofmultipleBitcoin addressesassociatedwiththiscampaign,theattackerwas indeedmakingeasymoney.
Thisattackcouldevolveinthefutureandusemoreupto datedatabreacheswhichinturncouldscaremoreusersinto payingtheransom,sobeonthelookout.
GandCrabholdsthetopspotinransomware,partlybecause it’susedbytheMagnitudebotnet.AlthoughGandCrabis usuallyspreadviaspamemail,ithasrecentlybeen distributedviacompromisedwebsitesandisnow
Pope Cyber Security EngineerShawn Pope is the Cyber Security Engineer of Nuspire Networks, a state-of-the-science managed network security provider for some of the largest and most distinctive companies around the world.
appendingthe.KRABextensiontotheencryptedfiles. TowardstheendofApril2018acampaignwiththesubject line“YourOrder#{RandomDigits}”wascirculating.There islimitedcontentinthebodyoftheemailandhasan attachedZIPfilewhichincludesaWorddocumentthat containsmaliciousmacrosthatdownloadandexecute GandCrabransomware.
GandCrabisunderconstantdevelopmentwherenew versionsareconsistentlybeingreleasedatanaggressive pace.Itsbasicfunctionalityiswelldocumentanddoesthe sametypicalthingsransomwaredoes,includingencrypting fileswiththe.KRABextension,changingtheuser’s background,andleveragingTorforcommunications.One oftheinterestingelementsofGandcrabisitsuseof namecoindomainsforCommandandControl(C2) communication.Theseareeasilyidentifiedbythe.bittop leveldomain(TLD).SinceattackersrelyheavilyonTor andnamecoindomainstohelpevadeidentification,itisa nobrainerforthemtouseadecentralizedDNSservicethat doesnotrelyoncentralauthority.Thisalsoincreasesthe difficultyofhavingdomainsshutdownandidentifying thosethatarepotentiallybehindthem.
BytheendofQ22018Microsofthadtakenoverthetop spotfromFacebookforthenumberonetargetofcorporate phishingattacks.Reasonbeing,it’shighlyprofitablefor hackerstocompromiseanOffice365account.Hackerssee email-basedattacksasaneasyentrypointintodata,files, andcontactsfromotherOffice365apps,including SharePoint,OneDrive,Skype,Excel,andCRM.
WeseealldifferenttypesofPhishingattemptsfromquite possiblytheworstattemptstoexactreplicasofalegitimate Office365loginpage.Unfortunately,Phishingwillalways existandcanslipthroughthegapsinemailfilteringdueto thefactthatnewdomains/URLsarepoppingupeveryday
tohostfakeloginpages.Thisiswhereuserawareness trainingisextremelyimportant.Educateyourusers,rollout trainingexerciseswhereemployeeswithfakePhishing emailsandseewhoclicksonthemandwhodoesn’t. BecausePhishinghasbecomesopopular,educationwill payoffinthelongrun.
Asidefromtrainingandeducatingemployeesonmalware, andransomwarethatmightcomeinthroughauser’semail, thereareafewothersolutionstotakeintoconsideration thatcanpreventtheseattacksfromenteringyournetwork.
1. Useantivirusprogramswithbehaviorandheuristic detectioncapabilities,withautomaticupdatesof signaturesandsoftwareonclientsandservers.
2. Implementaspamfiltertofilteroutknownmalspam indicatorssuchasmalicioussubjectlines,andblock suspiciousandblacklistedIps.
3. Markexternalemailswithabannerdenotingitisfrom anexternalsource,thiswillassistusersindetecting spoofedemails.
4. Implementablockpolicyforfileattachmentsthatare commonlyassociatedwithmalwaresuchas.dll,and .exe,andattachmentsthatcannotbescannedby antivirussucha.zipfiles.
5. ImplementDomain-BasedMessageAuthentication, Reporting&Conformance(DMARC),avalidation systemthatminimizesspamemailbydetectingemail spoofingusingDomainNameSystem(DNS)records anddigitalsignatures.
6. Implementasolutionthatcansendthe unknown/suspiciousfilestothesandboxforfurther investigationandanalysis.
7. Andmostimportantlyemployeetrainingonsocial engineeringandphishing.Urgeemployeesnottoopen suspiciousemails,clicklinkscontainedinsuchemails, orpostsensitiveinformationonline.
ThearrivalofChatbotsisconsideredtobeanincrediblebreakthroughintherealmofbusinessoranykindof
entrepreneurships.ItisoneofthesmartestinnovationsbyArtificialIntelligence(AI)andNaturalLanguage Processing(NLP)thatbusinessescancounton.TheChatbotisasoftwarethatcanbeprogrammedtocarryouta certainsetofactionsallbyitself,likeawind-uptoy,intextorspokenformats.Thecapabilityofthebotstolearnfrom thepastinteractionsandgrowinitself,makesitmoreattractiveandinteresting.Chatbotsworkintwodifferentways. Firstly,predefinedresponsesaregivenfromanexistingdatabase,basedonthekeywordssearchedbycustomers.The smartmachinebasedbotsattracttheirknowledgefromArtificialIntelligenceandCognitiveComputingandadapttheir behaviorbasedonthecustomerinteractions.
Theapplicabilityofthesechattingbotsisquiterelevantinthiseraofdigitalglory.Asthenewtech-savvygenerationof customersisalwaysconnectedtothesocialplatforms,theydefinitelyexpectaseamlessandlesstimeconsuming customerexperiencewiththebrandstheylove.Econsultancyfoundinaresearchthat57%ofcustomerspreferlivechat toemailoraphonecall.There’snosurprisethatconsumerstodayareappreciatingchattingortextingmorethanany otherformsofcommunication.Toaddressthispriorityofthecustomersandoutgrowinthiscompetitivebusinessworld, manybusinessgiantsareadoptingthesevirtualagents.
Withthewidespreadadoptionoftheartificialintelligence,thehumaninteractionandconnectivityhastakenafascinating turn.Thisextremelysophisticatedandversatiletoolcanbehelpfulincraftinganysmallorbigbusinessplan.Apartfrom beingawesomeinresolvingcustomercarequeries,Chatbotscanbeapartofanentrepreneurialstrategyinmanyways. That’swheretheappealofChatbotslies.Therearemanydifferentapproachestonavigatethisconnectivitytool throughoutthebusinessventure.Let’shavealookatsomeoftheseapproaches:
Aseveryorganizationhasauniquesetofcustomers,theChatbotsmustbeprogrammedinaccordancewith customer journey.Knowingthefinerdetailsofthe customer journey fromA-Z,mightbeprovedasthefoundationforsuccess.As AIisenactingalargerroleinbusinessreforms,havingaccurateforesightandexperienceisthemostneededprerequisite toprogramthebot.
Afterprogrammingthebot,itshouldbedesignedinawaythatwouldenhancecustomersuccessbyadvancingthem downthesalesfunnel.Amicroscopicviewofthecustomerserviceandsalesdataalwayshelpsinthisregard.Oneshould haveagoodgraspon:
Ÿ
Ÿ
Whichpatternsandquestionsareaskedthemost?
Howtheresponsescanbeprogrammedtoanswerallof them?
Ÿ
Andmostimportantly,inwhatwayallthenecessary informationcanbeprovidedtobringpeoplefrom awarenessstagetoadecision?
Inordertoguidethecustomerseamlesslythroughthesales funnelwiththehelpoftheintelligentbot,anentrepreneur needstoputhimself/herselfintheshoesoftheaverage customeranddevelopthebotaroundtheirpathtosuccess. Tobuildstrongrelationshipswithcustomers,another smarterwayisto“humanize”theChatbot.Peoplegenerally wanttobuysomethingfromotherpeople,notfromarobot. Therefore,programmingresponsesneedstobedoneina waythatreflectsthecharacterandpersonalityofthebrand. TheChatbotneedtobedesignedwithatingeofhuman empathywiththeauthenticbrandvoice.
Lastly,withthechangingdigitallandscape,customer mindsetsarealsoalwaysinthevergeofchange.Tostayon thetopofthegame,onemusthavetoconsistentlyanalyze thedataandevolvethebotaccordingly.
FutureofChatbots:
Chatbotsarecurrentlybeingutilizedaseasyandfunways onwebsites,socialplatformsandsmartphonestoassist customersintheirinteractionswithabrand.Evenifthe Chatbotsarestillinrudimentarystage,wecanexpectalot
moreprogressionsinthistrend.Withthegradualevolution ofArtificialIntelligenceandDeepLearning,theChatbots willbecomemoreempoweredtoedifytheconversational interfaceofbusinesses.Chatbotsaregoingtogetalot smarter,moreintelligentandindistinguishablefroma humanbeingwiththeadvancementofAI.However,itwill definitelytakesometrialsanderrorsbeforethechatting robotsmasterandadoptthedelicaciesofpolite conversation.
Also,it’squitepredictablethatthecostofChatbotswill eventuallygetcheaperastheadoptionofitincreasesacross multipledomains.AnexampleisFacebook’sdecisiontolet third-partyapplicationsbuildChatbotsintheirplatformhas drasticallyloweredtheprice.
Conclusion:
Itreallyamazesushowfartechnologyhascomeupinthe lastseveralyearsinthedigitalmarketingarena.However, somethingswillalwaysremainthesame.Evenif everythinggetsautomatedinthefuture,nothingwill minimizetheappealofoptimaluserexperience.Thebots canbeusedtoautomateahugechunkofthemarketing process,butwithoutmakingtheprocessdulland impersonal.Onlythenthesemarvelsoftechnologywillbe abletomakewonders.