Intelligent CIO Africa Issue 52 | Page 28

EDITOR ’ S QUESTION
MATTHEW GASKELL , SECURITY ANALYST , SYNTHESIS
A common mistake made is that network security is a build and leave endeavour . Network security requires constant monitoring and protection . New technologies such as Machine Learning and modern practices such as zero trust should be implemented to maintain a strong security posture .
Network security involves protecting access to the network , ensuring availability of the network and ensuring the integrity of the information transmitted across the network .
A common mistake made is that network security can be implemented once . For effective network security , this is not the case . Network security is an on-going concern that requires constant maintenance and monitoring . Good network security practices should be designed to reflect this .
Implementing modern stronger technologies and practices can go a long way to protecting against an ever-increasing amount and more complex threats .

As corporations seek to keep up with modern technologies , the demand for network security increases . With the increase in demand , skills for implementing and maintaining network security remains behind the curve with skills and resources being sourced from outside the Middle East and Africa ( MEA ) region .

A common mistake made is that network security is a build and leave endeavour . Network security requires constant monitoring and protection .
New technologies such as Machine Learning and modern practices such as zero trust should be implemented to maintain a strong security posture .
Communication and Internet technologies are becoming cheaper and more available to the MEA consumer . This has been a major driving factor in the subsequent networking technologies in the MEA market . The underlying security and integrity of the underlying communication networks has become so important given the dangerous environment that is the region .
Given the growing and evolving attack vectors and the skills problem CIOs have had to strike a balance in order to enhance their network security posture .
The MEA region presents a unique situation in that it is both a vulnerability and a threat . Given the lure of more lucrative regions such as Europe and America , the MEA presents itself as a threat rather than a vulnerability .
Network security denotes the set of actions taken to protect the information transmitted on a network from various security threats . These sets of measures aim to prevent unauthorised access and prevent any misuse of the network ’ s resources . IT teams need to design network security around network technologies and good architecture frameworks . Security awareness and training should also be a featured factor when designing network security .
For example in Africa , Nigeria the originator of the 419 scam , these have evolved into more advanced email phishing attacks and other African countries have followed suit .
However , Africa as a continent is not completely cyber safe . The rapid rate at which telco networks expand security skills have not been able to keep up with the evolving threat landscape and actor vectors .
28 INTELLIGENTCIO AFRICA www . intelligentcio . com