Intelligent CIO APAC Issue 04 | Page 33

NEARLY EVERY CYBERSECURITY SURVEY PUBLISHED IN THE LAST YEAR INDICATES THAT CYBERATTACKS ARE ON THE RISE IN TERMS OF FREQUENCY , IMPACT , DURATION AND SOPHISTICATION . www . intelligentcio . com INTELLIGENTCIO
Q + A + Q + A + Q + A + Q + A + Q + A + Q + A + Q + A +

JUSTIN AUGAT , VP OF MARKETING FOR ILAND

EDITOR ’ S QUESTION

There is no question that cybersecurity is top of mind for organisations worldwide . Nearly every cybersecurity survey published in the last year indicates that cyberattacks are on the rise in terms of frequency , impact , duration and sophistication . Recent data from Accenture shows that , over the last five years , the number of security breaches has risen 67 %, the cost of cybercrime has gone up 72 % and the complexity and sophistication of the threats has also increased .

Unfortunately , there is no ‘ silver bullet ’ solution when it comes to cybersecurity . As a result , organisations must take a multilayered approach to securing their data and proactively deploying solutions that enable the recovery of data if the security layers are defeated . Starting with security , our experience has shown that a combination of the following is best :
• Physical security : This includes monitoring , access security and ensuring environmental elements are protected such as power , cooling and power supplies
• Logical security : This includes network , storage and hypervisor security . In this case , virtual firewalls , encryption and logical segmentation should be standard
• Process : This includes role-based access , documentation and regular testing
• Certification : Finally , independent validation of the above by a reputable third party
With all of the above in place , the likelihood of a successful cybersecurity event is low . However , should the security fail , or the attack be so sophisticated as to overwhelm the provider defences , an appropriate data protection and recovery solution should be considered part of the cyberstrategy .
This includes protecting the data via airgapped backups . In this case , the cyber thief may have a copy of your data , but they will not be able to hold it for ransom . Air-gapped solutions restrict access to everyone but the provider .
In other cases , cybercriminals may be out to inflict maximum damage on the IT operation . In this situation , organisations would benefit from a dedicated disaster recovery solution leveraging a cloud provider that can accommodate a secondary production environment that ( also ) includes all the security and protection options above .
In the world of cybersecurity , the best offence is a good ( proactive ) defence . Given the frequency and sophistication of attacks over the last few years , it is clear that implementing multiple layers of security and protection is the best method to reduce the ability to attack and to limit the financial damage associated with an attack .

NEARLY EVERY CYBERSECURITY SURVEY PUBLISHED IN THE LAST YEAR INDICATES THAT CYBERATTACKS ARE ON THE RISE IN TERMS OF FREQUENCY , IMPACT , DURATION AND SOPHISTICATION . www . intelligentcio . com INTELLIGENTCIO

33