Intelligent CISO Issue 47 | Page 28

editor ’ s question

?

he start of 2022

T represents a very different cybersecurity climate to that of even two years ago . As businesses both big and small continue to navigate the new normal , the rise of Digital Transformation heralds a brand new world , characterised by increasing innovation and simultaneously , rising threats .

While some priorities around what is needed to meet customer and business needs will shift , what will always remain is a focus on security for APAC businesses .
Organisations will continue to face rising instances of data breaches and cyberattacks , along with the challenges of a hybrid workforce and managing legacy systems . To address this , security must remain a priority for information and technology leaders .
A greater need for a hybrid workforce , mobilised through the use of digital technologies , brings new challenges for businesses . Hybrid workplaces mean an increasing number of access points for malicious actors , contributing to the 56 % of SMBs surveyed by CISCO in Asia Pacific who have experienced rising breaches .
With a globally mobile workforce , traditional security systems designed for a static workforce are no longer appropriate to keep sensitive information safe .
The solution is found in the adoption of digital identity management platforms and Zero Trust architecture which put the user at the centre of security .
Investing in biometric identification provides a unique form of identity access , putting users at the centre of their logins in a way that can ’ t be replicated by malicious actors .
Adopting a Zero Trust architecture also helps restrict access controls to applications , networks and data by different groups of staff members or external stakeholders .
This provides a more comprehensive overview of what data is accessible by whom in the process . The benefit is a comprehensive solution minimising where points of attack can occur .
With a nearly 13 % increase in the volume of cybercrime reported within Australia alone in 2021 , business leaders must continually invest in stronger and more resilient systems .
They must also ensure none of the applications or programs they currently use contain any potential vulnerabilities .
Ongoing monitoring is key . Setting procedures in place to constantly monitor and re-evaulate every application and program used will help businesses identify programs no longer in use so they can remove them from their systems .
Having these procedures in place will also provide visibility into programs
JAMES ROSS , ANZ REGIONAL VICE PRESIDENT OF FORGEROCK that need regular patching , to minimise instances where malicious actors can use these programs as potential back doors to facilitate cyberattacks .
Finally , APAC organisations are experiencing an increase in the number of ransomware incidents and identity breaches . In Singapore , the rise of the pandemic saw ransomware incidents dominate the cyber landscape , and within Australia , there was a 30 % increase in data breaches compared to 2020 . While greater protections , monitoring and tech stack upgrades can help to mitigate this , investing time in building employee and customer awareness around threat management is equally important .
The 2021 ForgeRock Consumer Identity Breach Report found that passwords and usernames ( often shared across multiple platforms and websites ) resulted in a 450 % increase in cyberattacks . While not an uncommon practice , users fail to recognise the threat behind shared passwords and as a result , the lack of security can result in crippling losses .
Updated security policies and practices to encourage the use of login methods that require Multi-Factor Authentication will be crucial to minimising instances of breaches occurring this way . APAC is facing an increasing number of security threats .
With the way we work and how we utilise online services constantly shifting , businesses need to ensure cybersecurity is top of mind as they implement new services for customers and employees alike .
By getting into the habit of reviewing legacy systems and implementing more secure login methods like Multi-Factor Authentications , APAC businesses can help minimise instances of cyberattacks occurring .
28 www . intelligentciso . com