The IT industry has suffered losses due to the change in format of cyber problems
Amit Mahajan, VP Technical, VIBS INFOSOL
Important factors for cyber security readiness
Most of the organizations still in puzzled mode on Cybersecurity readiness, either they spend on wrong products or they keep on thinking which way to choose. According to the NIST Cybersecurity framework, an organization must have five functions: Identify, Protect, Detect, Respond, and Recover, to be eligible for Cybersecurity readiness. To intricate, identify the available assets in the network, the vulnerabilities, protect those assets and remediate the vulnerabilities using tools or devices like Firewalls, patch management solutions etc.
Similarly, detection of known-unknown threats, may be zero day attacks, using behavioural analysis and respond effectively by recovering the data or stopping the malware to act further. Many solutions are present in the market now.
Problems faced by the CIOs/CISOs
We all know the kind of problems we faced in Covid Times, most of us suffered with some or kind of losses. Similarly the IT industry has suffered losses due to the change in format of cyber problems. Few points which were the worry factor in those days, in fact they are still challenges for some organizations, like Inability to monitor user in WFH/flexible work hours, Increased number of phishing attacks, More number of Ransomware attacks on end user systems, Absence of solutions with Threat Intelligence and Analytical capabilities, Lack of Internet bandwidth for individuals and many other. Initially it took time for the organizations to reach the right product, hence we helped them to conclude.
Commonly adopted technologies
It was really a challenge for customers to choose the product with a restricted budget. Solutions like Data Leak Prevention, Behaviour based detection, Bandwidth hungry Patch Management Solution, Proxy in Hybrid environment, Limiting access to corporate data for Work from Home users were in demand.
Some of the organizations also went for a Data Encryption solution to prevent data theft. Many organizations adopted the new solutions to address their concerns.
To face the challenges
Initially in post-covid days it was a difficult time for us also. Changing focus of Customers towards end user products, remote infrastructure management solutions, behaviour based detection tools, forced us to keep the on-premise solutions in briefcase. And then we started working on those solutions.
Right now, we are well equipped with the list of technologies to address their concerns and also continuously spending on the technical team training with required level of hands-on. Vendor certifications are also a part of the training progra
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.