Skip to content
Do enterprises need to revamp their cyber security strategy?

Do enterprises need to revamp their cyber security strategy?

Pankaj Kamboj, Sr. Manager, Zensar

Read time: 5 mins

It seems like companies of every size are at risk of becoming cyber-attack victims. The question is who becomes first and who is second in the race is just a matter of time.  

Keeping in mind the rampant sophisticated attacks such as ransomware, data leaks, etc., has seriously allowed the enterprises to rethink their overhaul cyber security operational strategy. Another concerning point is Covid-19, which has changed the way they were operating earlier, migrating away from the old reactive-based security approach to a proactive yet adaptive way of hunting the suspicious patterns & activities by leveraging AI/ML-based technologies and automatically respond the incidents through a centralized console.  

Let’s look the how these new approaches will solve the puzzle of operational cyber security. 

Protecting Data: In the recent past, there have been digital upheaval adoption of businesses hovering around the data and managing & securing itself is a daunting task. In a nutshell, data is becoming the new commodity, which is the target priority for cybercriminals. You need to have a robust platform to ensure data security and compliance to mitigate the risk. This can only be achieved if you have an integrated platform, providing complete data discovery to classification & compliance around data-no matter where it is. 

XDR (Extended Detection and Response): This is a confusing and puzzling term used in the industry. While every vendor or OEM claims they have XDR, some offer at an endpoint, few suggestions at Network or cloud side of it but none of them has a full-fledged integrated & holistic XDR service. In other words, XDR is a proactive yet adaptive way to hunt for the vulnerabilities in the ecosystem and respond to them in a centralized, automated way by leveraging AI/ML-based technology. This way reduces the time to respond and proactively hunt for the vulnerabilities that can create havoc in the enterprise. This is just the beginning of a new era of responding to cyber incidents automated in a sizeable connected complex environment. 

Cloud Security: This is a hot topic in today’s IT world. Every other enterprise is in the process of migrating to the cloud without even doing the proper due diligence. In the fast pace, they often forgot to follow the basic security principles such as Secure by Design, Secure by default, and secure by deployment. No matter which public cloud you choose to go to, the security fundamentals and principles will remain the same. In the recent cloud assessment with one of the large clients, we found that basic hygienic was not maintained, such as admin login without MFA, public cloud storage bucket was open, root account used to access the service, to name a few. Imagine that an enterprise might be on its knees if the vulnerabilities are being exploited. Therefore, an enterprise must have a third-party cloud assessment to see their cloud & compliance posture where they stand from a security standpoint. 

To summarize this, it is pertinent for enterprises to invest wisely in security because control will not do anything until or unless it has not been deployed properly or for the purpose that doesn’t make sense to an enterprise. To stay ahead in cut-throat competition, you must find the right partner that can help secure every aspect of your business and who can grow with your growth.  

Foundation Services

Also read: