Intelligent CISO Issue 38 | Page 65

Physical security solutions are an entry point threat actors are using to gain access to networks of large and small enterprises .
BUSINESS SURVEILLANCE
cybersecurity as part of their business and manufacturing practices and ensure they are operating in a framework of governance and best practice .
Unfortunately , another fallout of this attack may be contributing to fears about moving to cloud-based solutions . Our report ’ s findings prior to this attack pointed to almost two-thirds ( 64 %) of physical security respondents having somewhat ( 51 %) or greatly ( 12.5 %) accelerated their cloud strategy during the pandemic .

Physical security solutions are an entry point threat actors are using to gain access to networks of large and small enterprises .

deployment can positively contribute to an organisation ’ s cybersecurity stance . Cloud services typically have cybersecurity features , monitoring and updates built-in , ensuring implementations have policies , controls , procedures and technologies that work together to protect the system and , by extension , the network .
The cloud is often perceived as insecure ; however , one in three breaches is caused by unpatched vulnerabilities on the network , demonstrating that real challenge relates to organisations ’ ability to keep software deployments up to date . An illustrative example of this includes the recent hack carried out by Hafnium , a group reportedly backed by the Chinese Government , which infiltrated the network of over 30,000 organisations across the US , ranging from SMEs to local governments .
This was the result of on-premises servers not being appropriately configured or updated when they should have been , leaving them exceptionally vulnerable . As security solutions evolve in the new normal , it is critical that businesses don ’ t lose sight of the simplest yet most important part of cyber hygiene – ensuring that all IoT devices and on-premises servers are running the most secure version of the firmware that ’ s available .
Cybercrime is a universal challenge and it is one that the report indicates EMEAbased physical security practitioners are beginning to address in earnest . While there ’ s nothing companies can do to make themselves completely impervious to a breach , every effort must still be made to reduce susceptibilities . The key here is to invest in the right expertise , ensure best practices such as cyber hygiene are prioritised and only integrate trusted devices on to the network . u
This is encouraging as including cloud in all or part of a physical security
www . intelligentciso . com
65