IT Security - Asystec

With targeted attacks predicted to rise, the rapid pace of smart connected device deployment and demand for access to more information than ever before, anywhere on anything, the pressure on IT security has never been greater – do you agree?

Historically investment in security meant securing the single egress/ingress points into an organisation, however with organisations now more porous than ever, due to extended connectivity to support outsourcing, EDI, BYOD, Apps, etc. this is becoming more difficult.

Many organisations are presuming they have sufficient controls in place.  But what is also coming to the fore is a realisation that they don’t have enough visibility around what is going on in their environment to be able to answer that with confidence.  An understanding of what is ‘normal’ activity within an organisation is key to understanding what is appropriate for their specific needs.

So first of all a customer needs to understand their IT environment, everything from ensuring their permission structure is a least-permissive model, understanding where sensitive data resides across the organisations data sets, be they in-house or not, having an audit trail of activity not only on the data but across the whole environment to remediate known deficiencies but also having access to analytics around what is ‘normal’ activity to identify quickly and automate the response to a breach.

Organisations need to move from a prevention-based approach to a focus on people, the flow of data and on transactions.  Once we have an understanding of these within the context of our own organisations then we can move to a monitor- and respond-based approach, which will significantly reduce risk and our responses to a breach.

As organisations move to 3rd generation platforms, i.e. the connecting of many more users with significantly more apps, the automation based on policies, the filtering and highlighting of significant issues ahead of less significant, and the need to do secure significantly more information with the same or less staff will be the significant challenges that Irish organisations will need to address.

Need more information? Please do not hesitate to contact us here 

Brendan McPhillips
Brendan McPhillips – Director, Security & Governance Practice Lead

Leave a Reply

Your email address will not be published.


After you have typed in some text, hit ENTER to start searching...

GDPR Check List

Use Asystecs GDPR Check List to identify how compliant your organisation is. 

GDPR Check List

You have Successfully Subscribed!