Intelligent Tech Channels Issue 38 | Page 37

FUTURE TECHNOLOGY
enable remote access to corporate assets . Many companies allowed connectivity from unmanaged home PCs and personal mobile devices were allowed access to networks . Businesses turned to the cloud for scalability purposes , while not scaling their security posture in comparison to their traditional data centres . All these moves present many opportunities for hackers to strike . Businesses must look at implementing holistic security strategies to secure not just their networks , but also include the Edge and the cloud .
What can companies do today to ensure good network security ?
With so much of complexity arising due to the shift in how business operates in the new normal , it ’ s important that we keep things simple . Focus on real-time threat prevention which is the key to preventing the next attack . Everything has to be reassesed and made secure – current network posture , processes , compliance of connected mobile and PC devices . Businesses must improve cloud security measures while moving to the cloud – it is the responsiblity of organisations to ensure data security in the cloud while understanding that cloud providers would only be responsible for providing a secure hosting platform . Move to a unified management – an organisation should aim for high visibility levels by consolidating . They must revisit their security investments and focus on consolidating their security investments by reducing the number of point product solutions . •
With so much of complexity arising due to the shift in how business operates in the new normal , it ’ s important that we keep things simple .
INTELLIGENT TECH CHANNELS
INTELLIGENT TECH CHANNELS Issue 38
37