Approaching CyberSecurity both Organizationally and Personally
Kavneet Randhawa

Approaching CyberSecurity both Organizationally and Personally

Throughout my experience as CEO of KAVI INK, I’ve heard of many different approaches to providing cybersecurity solutions offered to enterprises and users of the internet. This is what has worked for me.

First, there is the approach that encourages you to buy more and?more products. For every type of issue you may have, you should buy a new point solution addressing only that particular segment need. Three different firewalls, IPS, sandboxing tools, anti-bot, anti-spam... the list goes on and on. This is not the right approach. There are hardly any companies that can manage all these solutions, not just in terms of their high costs or the overhead required to operate them, and there will be security gaps and security indicators that are not shared between the products

Second, there is the approach that emphasizes?detection?– finding many types of malware on your network and then trying to figure out how to act upon it. While in our physical world it might work – we can figure out how to act quickly – in cyberspace it doesn’t. Malware moves at the speed of light and it can take days, weeks and in most cases months (the industry average is several months) to remedy the problem.

This leads some people to move to the third option – focusing on?remediation.?It accepts that attacks will happen, assuming that if you’ll be breached in any event, you might as well focus on remediating the damages. Once again, this doesn’t work, because as soon as the attacks breach your networks, the damage is?already done and remediation can be a long, costly process. A recent survey I’ve seen reported an average cost of $680,000 per incident. That is insane.

The last approach, and the one I believe is the most effective, focuses on?prevention?and presenting a well architected and?consolidated?approach to cyber security. It looks at the entire organization and focuses on creating a single architecture that covers all environments and is managed by a unified platform. It keeps every entry point to the organization secured all the time, be it the traditional network, the data center, mobile devices or the cloud server. In this approach, attack indicators are shared among all environments. Several technologies are synchronized to provide multiple-layers of protections, and all entry points are protected with no security gaps between. According to this approach, there is also a need to deliver actionable threat intelligence between every device, network, branch office or endpoint, so that even if one environment will be targeted – all the others will be able to identify the same threats and block it.

要查看或添加评论,请登录

Kavneet Singh Randhawa的更多文章

  • CYBER SECURITY AT HOME

    CYBER SECURITY AT HOME

    Almost every household is connected to the Internet. A strong Internet connection is even more important now because…

    2 条评论
  • SIM SWAP

    SIM SWAP

    Several reports show loss of crores of rupees through SIM swap The Federal Bureau of Investigation (FBI) warned SIM…

    1 条评论
  • The Evolution of the Golden Age of Gaming in India

    The Evolution of the Golden Age of Gaming in India

    The world’s first-ever video game was a simulation of real-world tennis called Tennis for Two, which appeared 61 years…

  • Health and Wellness.....

    Health and Wellness.....

    One of the Most Dynamic industries of he world..

  • Carpe Diem.......by Robert Frost

    Carpe Diem.......by Robert Frost

    Age saw two quiet children Go loving by at twilight, He knew not whether homeward, Or outward from the village, Or ..

    2 条评论
  • Fears...When I have........By John Keats.....

    Fears...When I have........By John Keats.....

    When I have fears that I may cease to be Before my pen has glean'd my teeming brain, Before high-piled books, in…

  • All These I loved.....

    All These I loved.....

    Rabindranath Tagore..

    2 条评论
  • To My Lady.....

    To My Lady.....

    Beloved beauty who inspires love in me from afar, your face obscured except when your celestial image stirs my heart in…

  • Dream.....

    Dream.....

    “I am a dreamer. I know so little of real life that I just can't help re-living such moments as these in my dreams, for…

    3 条评论
  • Benefits and Risks of Artificial Intelligence......Perception V's Reality

    Benefits and Risks of Artificial Intelligence......Perception V's Reality

    LEKAV..

    7 条评论

社区洞察

其他会员也浏览了