4 strategies for dealing with security threat 2.0

Nothing in the corporate world moves as fast — or with as much agility — as a determined hacker. They do, of course, enjoy substantial advantages: hackers do not need to seek approval from project sponsors; they do not build business plans or change management models; and if their project fails, they simply disappear and resurface under a different guise to attack again.

And while hackers certainly represent an increasing threat to corporate security, today's CIOs are also facing security challenges from a range of new, and often less criminal, sources. As a case in point, the ongoing WikiLeaks scandal provides a vivid and public example.

The threat of internal leaks is increasing with the popularity of whistle-blowing sites; government-sponsored actors are becoming more aggressive in their hacking initiatives; and loose groups of moral hackers are coalescing around popular issues to mount organised attacks, as evidenced by the disruption caused by the Anonymous Payback attacks in January.

Here are some tips on how to deal with today's security threats:

React with agility
In today's fluid and complex security environment, traditional security systems and controls can only provide a finite level of protection and defence against this range of potential threats. As a result, many CIOs are starting to place renewed emphasis on building robust response strategies that provide them with the agility and flexibility to quickly react to issues as they arise in order to protect the organization's mission-critical systems.

This, in turn, will require a culture change as employees become better informed about their responsibilities and gain a stronger understanding of their role within the organisation's larger security framework. And while this type of change initiative may require a longer-term strategy, many CIOs will find that the effectiveness of their security systems increase exponentially as more employees become security-aware.

1 2 Page 1
Page 1 of 2
7 secrets of successful remote IT teams