Security controls for every business

Security
Mastering Security Basics

Security breaches are happening too often and while hackers get smarter, enterprises are not doing enough to protect their data. In fact, NTT Group's 2014 Global Threat Intelligence Report revealed that 43 percent of incidents in 2013 were the result of malware.

The report claimed that companies were missing basic controls like anti-virus and effective vulnerability life cycle management contributed to such attacks. Half of the vulnerabilities detected during scans have had patches available for at least two years – yet businesses had not installed them – and anti-virus failed to detect more than half of new malware.

Malware is here to stay, so it is every IT department's responsibility to get the basics right if they are to protect their business from today's threats. Businesses could save significant sums if they put in place processes to reduce the risk of exposure. Prioritising controls and putting risk in context could have saved one company over $109,000 according to the report.

The basics

Vulnerability scanning is the most basic security measure. Where a security assessment is conducted to scan the customer's environment. Too many organisations aren't using these highly automated tests. Intelligence into vulnerabilities is invaluable as it offers insight into how attackers could use information to gain access to data assets. These vulnerabilities still need to be balanced against the business risk and put in overall context so that valuable resources are focused on mitigating the real risks to the business.

IT departments should analyse and collect logs, we have found that logging and the use of SIEM is a tick box exercise and no analyses or correlation of logs takes place . Regularly tracking logs gives enterprises greater access to threat intelligence, so they can predict future risks.

Another basic security control, which is ignored by most firms according to the GTIR report, is incident response planning. Appropriate incident response is vital for minimising the impact of a breach. By having a well-defined and regularly updated plan, and recognising that security incidents will happen, organisations will be better prepared to handle incidents in an effective and consistent way.

Collaborate for better protection

Savvy enterprises are now working with a trusted provider to run basic measures. Outsourcing provides and augments the in-house skills of an organisation and enables that company to focus on building and developing its business. The outsourcer meanwhile provides risk intelligence to enable the board to understand, prioritise and manage risks and make informed decisions in a timely manner.

A trusted provider might be a Managed Security Services (MSS) partner, which can access intelligent information for active threat management. An MSS partner, which typically has access to collective global knowledge and systems, provides visibility and control to manage information security risk – and is therefore able to actively notify customers about possible threats and proactively mitigate them.

In a society with constant real world threats, it is time for information security professionals to take responsibility for their own data. When the basics measures are done right, and with the support from a trusted provider, they can be enough to put risk in context and even help avoid breaches.

  • Garry Sidaway is Global Director of Security Strategy at NTT Com Security and is a respected security expert. With over 20 years' experience in the IT industry, Garry's focus is on meeting business needs through the development of managed security services, business infrastructure, consulting and technology integration worldwide.
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring