“Considering today’s advanced threats, it is vital that business leaders develop a comprehensive cybersecurity strategy”, says Jeremy Matthews, regional manager at Panda Security Africa. “Achieving cyber-resilience requires a proactive approach from CIO’s and CISO’s”, continues Matthews.
To mark Computer Security Day 2018 (30 November 2018), Panda Security released an eBook 2018 in Cybersecurity, as a go-to cybersecurity resource for business leaders. The book is a compilation of insights, advice and opinions from 11 global industry experts.
It has become increasingly important to ensure organisations’ data is secure. Particularly with the implementation of GDPR and POPIA regulations. Independent cybersecurity consultant, Xavier Mertens advises that organisations should see these regulations as an opportunity to go back to basics with their strategy – to ensure they have a view of all the elements of their security.
A key motivation behind cyber attacks is the potential pay-day.
“Cybercrime is a very profitable business model, with little exposure for the perpetrator, and is difficult to fight”, says Silvia Barrera, a renowned cybersecurity expert. This has driven the increasingly advanced threats and frequency of attacks we have seen in 2018. Throughout the e-book security, experts share insight into the nature of attacks and importantly, how we can combat attacks.
As part of the discussion on the state of cybersecurity, the experts share their insights into a new paradigm of security that takes a proactive approach of prevention.
In the eBook, Barrera says that a reactive approach is still necessary but on its own is no longer effective or sufficient. Ninety percent of success in the fight against cybercrime is prevention, awareness and security controls, and only 10% is reactive actions such as investigation and prosecution.
Next-generation EDR solutions, such as Panda Adaptive Defense with its 100% attestation module and integrated Threat Hunting and Investigation Service (THIS), provide additional layers of protection by monitoring all processes running on endpoints in the network and gathering log data to identify potential risk areas. Organisations need to consider a multi-layered, proactive approach when forming their cybersecurity strategy if they hope to prevent the kinds of attacks we face today.
Access the 2018 in Cybersecurity e-book for more.