Why are we in the era of information protection?

Jan 02, 2019327

As companies advance on their digital platforms, with the implementation of sophisticated technology systems, there is growing fear of cyberattacks - sabotage, theft, or even hijacking vital data and information. This concern makes sense. According to global information security company SonicWall, the year 2018 has already set a record for this type of threat. In its biannual report, the company estimates that 6 billion network system threats worldwide have been logged from January to June. That number is more than double that of the same period in 2017.


The theme is so relevant that it was one of the main themes of the 2018 World Economic Forum in Switzerland. Alois Zwinggi, general director of the forum and leader of the Global Cybersecurity Center, said in Davos that "if we are to avoid an era of digital darkness, we need to work harder to ensure that the benefits and potential of the Fourth Industrial Revolution are safe for the society". So cyber security is the watchword. And it goes beyond borders. Leaders of large global companies are constantly in search of more and better data protection systems.


Research by Russian Internet security consultancy Kaspersky Lab in Latin America in 2018 points out that large corporations are allocating up to 30% of their IT budgets for online security in a strategy of redefining corporate data protection. Mauricio Fiss, the technology partner of global consultancy Protiviti, confirms: "In recent years, the cybersecurity market has exploded. Because of the increasing number of attacks, the amount of encrypted data in enterprises has only increased. "


We have reached a stage where companies no longer have the option of worrying about digital security or not. "It's a matter of survival. Without cybersecurity there is no way to digitize a company, and a company that is not digital does not survive. "


Experts heard by FORBES are unanimous in saying that it is not enough to arm themselves against external threats; it is necessary, first of all, to be attentive to internal security breaches. The main cyber security problem in the country lies in the exposure of corporate data. He reiterates that much of these leaks do not originate in external invasions, but in internal joints or errors.


Companies are too worried about outsiders, but most of the problems are caused by employees, whether by mistake or bad intent. Who remembers taking that ex-employee out of the shared file network? Often, when you open the settings, you can see that there are several people who are no longer in the company and still have access to internal data.


Companies involved in data leaks suffer an average 8% decrease in their stock value on the day after the discovery of a failure. Investors interpret these companies as unreliable.


As a human failure, analysts also include oversights of executives and employees when they are not necessarily in the physical space of the company. Smartphones, like mobile devices, for example, are increasingly targeted. Today's technology allows all the information you need, or guard, to be in the palm of your hand. That is, sometimes the employee, in his leisure time, is carrying with him a series of essential information about the company in which he works. Public places are not best suited to dealing with confidentiality issues, either because someone can hear you or because of the wi-fi.


A basic lesson is to avoid making the most of connecting to public networks. By sharing the same network as you, someone who is malicious may gain access to your device if it is not properly shielded. The orientation is to invest in the 4G network.


Care must also be taken with the programs used by executives inside or outside the company. A survey shows that companies have on average 200 unmapped systems, from programs downloaded to file sharing media.


It is not enough to instruct and even monitor your employees if the systems used by the company do not have adequate protection tools. It is recommended that companies purchase "security by design" programs that already come with the necessary security tools. You do not just talk about smart city, but on safer city: if you're going to offer a solution, you have to offer it safely. No one is going to buy a car that runs a lot, but it has no brake. With IT, people do not have that culture. The company buys a system and has to run behind to add the necessary instruments, such as if you install the seat belt and airbag only after using the car.


In this digital transformation environment, often the area of ​​information technology goes to tow. So it's important to have a governance process - but you can not do it without the specialized tools.

Related Articles