TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentral TechCentral
    NEWSLETTER
    • News

      Management shake-up at TymeBank – including a new CEO

      24 May 2022

      Standard Bank CEO apologises for weekend downtime

      24 May 2022

      South Africa fifth in Africa for blockchain funding

      24 May 2022

      Hein Engelbrecht to lead Mustek on interim basis

      24 May 2022

      Datatec in talks over Analysys Mason unit

      24 May 2022
    • World

      Terra collapse triggers $83-billion DeFi slump

      24 May 2022

      Zuckerberg sued in personal capacity over Cambridge Analytica

      24 May 2022

      Is the end of the bitcoin winter nigh?

      24 May 2022

      Zoom leaps higher on upbeat forecast

      24 May 2022

      Michael Dell becomes kingmaker in Broadcom, VMware deal

      23 May 2022
    • In-depth

      Bernie Fanaroff – the scientist who put African astronomy on the map

      23 May 2022

      Chip giant ASML places big bets on a tiny future

      20 May 2022

      Elon Musk is becoming like Henry Ford – and that’s not a good thing

      17 May 2022

      Stablecoins wend wobbly way into the unknown

      17 May 2022

      The standard model of particle physics may be broken

      11 May 2022
    • Podcasts

      The rewarding and lucrative careers to be had in infosec

      23 May 2022

      Dean Broadley on why product design at Yoco is an evolving art

      18 May 2022

      Everything PC S01E02 – ‘AMD: Ryzen from the dead – part 2’

      17 May 2022

      Everything PC S01E01 – ‘AMD: Ryzen from the dead – part 1’

      10 May 2022

      Llew Claasen on how exchange controls are harming SA tech start-ups

      2 May 2022
    • Opinion

      A proposed solution to crypto’s stablecoin problem

      19 May 2022

      From spectrum to roads, why fixing SA’s problems is an uphill battle

      19 April 2022

      How AI is being deployed in the fight against cybercriminals

      8 April 2022

      Cash is still king … but not for much longer

      31 March 2022

      Icasa on the role of TV white spaces and dynamic spectrum access

      31 March 2022
    • Company Hubs
      • 1-grid
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»Sections»IT services»6 security trends for another year of Covid

    6 security trends for another year of Covid

    IT services By three6five19 January 2022
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Almost every business, in some way, was forced to alter its operations due to the Covid-19 pandemic. When the first lockdown hit, flexible working was not on many businesses’ agendas, but Covid thrust them into a situation that left them no choice – do it or fall behind.

    The problem, however, is that these “situational reactions” were not adequately thought through or methodically planned, which is crucial when securing a virtual workspace.

    Now, nearly two years later, the solutions that were intended to be temporary have become permanent, cementing lax security into place.

    For more, visit www.three6five.com

    As we enter 2022 – and another year of Covid – businesses need to take a step back and re-evaluate their remote working and security strategies, especially if they’re to keep up with these trends we see in the market:

    1. The risk landscape continues to evolve

    Businesses tend to prioritise productivity and continuity over security when implementing remote and hybrid working arrangements. When employees needed quick access to data and systems, many companies based their decisions on technology and not security.

    With the enactment of the Protection of Personal Information Act (Popia) last year, and with people accessing company information from all sorts of devices and connection points, this lax approach to security – and especially mobile security and device management – will soon catch up to businesses.

    The risk landscape is bigger than it’s ever been, and a business’s obligation to secure data must become a priority.

    2. Disinvestment in multiple technologies and vendors

    The increase in Covid-driven cloud adoption has resulted in a drive to consolidate and simplify the number of solutions and vendors in the technology stack. That’s because the more tools a business has, the more complex and expensive it becomes to manage and secure the network. And the by-product of more tools is more alerts and a noisy environment that makes it easier for threats to go unnoticed.

    The Holy Grail of security ensures all tools and solutions work well together, making the sum greater than its parts. Getting this right requires a mindset shift from wanting the “best-of-breed” Magic Quadrant solutions to making technology decisions based on how well they integrate with existing infrastructure and how the addition – or removal – of a solution will reduce risk exposure and/or increase operational complexity.

    3. Behavioural analytics will do the heavy lifting

    The “alert issue” will never go away and has been a sore point for many security engineers. As we add more granular security, we increase the amount of visibility and alerting. While this is not always a bad thing, it can become challenging for an SOC to differentiate between alerts or distinguish serious threats from minor incidents.

    That’s why businesses are increasingly using behavioural analytics, supported by artificial intelligence and machine learning, to identify deviations in user behaviour in real time. Coupling this with event correlation and presenting a much simpler output and context-rich data to the security team allows them to quickly identify and action alerts and incidents that matter.

    4. ‘Zero Trust’ adoption

    The dissolution of the perimeter has made security boundaries challenging to define and protect using traditional mechanisms and concepts. Identity has become the new perimeter and a “Zero Trust” approach has gained traction as a concept and security model.

    In simple terms, Zero Trust is about removing all assumed trust and continuously evaluating and enforcing security policies in a dynamic manner against users, devices, and applications or services. With continuous behaviour assessment using advanced analytics, businesses can move away from static, ineffective security policies designed to create walled gardens towards dynamic rules that respond in real time to user and environmental behaviour.

    5. Rise of SASE

    Cloud adoption and “work from anywhere” has placed demands on network and security to scale elastically without sacrificing visibility and overall security. Furthermore, a focus on data in motion and at rest, as well as cloud application awareness, has created a market for security services and controls that can meet these needs.

    SASE, or “Secure Access Service Edge”, relies on Zero Trust as a core security principle and provides connectivity and protection mechanisms between users and cloud applications, as well as visibility and enforcement between applications.

    By consolidating numerous security and networking functions into a single managed cloud service, SASE reduces complexity and costs, enhances access and security, and enables fast and secure cloud transformation.

    6. Cyber insurance will become commonplace (we hope)

    It is likely that every business at some point will experience a variation of a cyberattack. Whether this is a denial of service against a website, or ransomware finding its way onto critical corporate data, the impact could be significant. More concerning is that these kinds of breaches have been successful against global companies that spend millions on security products and technologies and have experts working around the clock to monitor, detect and remediate breaches.

    Clearly, even the best products deployed by specialists are sometimes not enough. While each company should perform a reasonable amount of due diligence in accordance with their needs, there quickly becomes a point of diminishing returns. A trend is emerging to mitigate the risk by passing it on to someone else – in this case, cyber insurance companies.

    For a fixed cost, businesses can manage the risk presented by cyberattacks with clear aid and outcomes, which will recover damages and costs and ensure business continuity going forward. Cyber insurance, we hope, will become a common discussion when security is mentioned.

    Security first, always

    Hybrid working will become standard operating procedure for many businesses — if it hasn’t already. To support this level of flexibility, businesses need to move away from technology strategies and adopt security-first strategies to succeed in a hybrid working world.

    Knowing what to do next can be overwhelming, especially for businesses with a less mature security strategy. Find a tech-agnostic managed service provider that takes the time to understand your business and is happy to be guided by your security framework. Contact us at three6five. We’ll get the ball rolling.

    About three6five
    Three6five is a leading digital business infrastructure operations (DBIO) solutions provider. Founded by engineers in 2006, three6five understands how to apply digital technologies and how to build and manage digital networks that work best for businesses. It helps clients to identify and seize in-the-moment, business-defining outcomes, helping them to create, deploy and support the forward-thinking infrastructure they need to translate digital technology into business success. Three6five is a proud B-BBEE level-2 contributor. For more, visit www.three6five.com.

    • This promoted content was paid for by the party concerned
    Three6Five
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleOrganisations face big gaps in their Zero-Trust implementations
    Next Article South African inflation number shocks on the high side

    Related Posts

    Management shake-up at TymeBank – including a new CEO

    24 May 2022

    Standard Bank CEO apologises for weekend downtime

    24 May 2022

    South Africa fifth in Africa for blockchain funding

    24 May 2022
    Add A Comment

    Comments are closed.

    Promoted

    Generalists tend to outperform specialists when the going gets tough

    24 May 2022

    Vodacom champions innovation acceleration in Africa

    23 May 2022

    Kyocera answers top 10 questions on enterprise content management

    23 May 2022
    Opinion

    A proposed solution to crypto’s stablecoin problem

    19 May 2022

    From spectrum to roads, why fixing SA’s problems is an uphill battle

    19 April 2022

    How AI is being deployed in the fight against cybercriminals

    8 April 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.