Under the hood: Enterprise IT Security
https://healthinformatics.uic.edu/blog/cybersecurity-how-can-it-be-improved-in-health-care/

Under the hood: Enterprise IT Security

When you log in on a Monday morning, a steaming cup of coffee in hand and your trusted company laptop booting up, it’s unlikely the first thought that crosses your mind is a cyber-attack.

It is fair to assume that your company is doing enough to prevent a hack, outage or breach from ruining your Monday morning and putting a big spanner in your day’s plans and schedule. And indeed your organization is protecting you and your chances of getting affected by any of these.

IT infrastructure protection is a complex business. Where would one start? Especially if you are a security leader in your organization. Let us take for example, as you sip on that hot delicious coffee, your mouse hovers over your company’s ERP system, you need to download some reports from the portal. You double click the icon and you are taken to the portal in a jiffy.

In this simple process the following things have taken place:

1.????Your ERP system credentials have to been accessed as the application needs to run for you, an authorized user. A precaution to ensure your login is secure and safe means having a secret manager set up that handles this diligently.

2.????As you access your ERP software, which is on a cloud server, an SSH (secure shell) key and its management software are engaged to protect your machine from the open network, a dangerous place where data is vulnerable to attacks easily.

3.????Your reports are in a database which you will be downloading anytime now. A hack of this can give out a lot of sensitive information about your organization and your work. A key management system employed by your organization will have the express role of managing this database and keeping vigil.

4.????As you commence downloading these reports, there is Data in transit or motion from a data base (server) to your machine. A PKI and certificate management system tracks this communication via keys and certificates continuously and ensures there are no rogue certificates, expired ones or any other challenges that can stop these machines from communicating and hence your download completes successfully.

5.????Even as you view these reports, your own machine is being monitored and kept secure. This is being done by an IT admin who will have a level of access to your machine which you would not. Even the ERP application will need this privileged access at times. But privileged access means hackers will try extra hard for this. Hence a privileged access management system would be needed and your organization would have the best ones to safeguard you.

6.????Finally, HSMs or physical computing devices help safeguard and manage digital keys, perform encryptions and decryption functions. These devices will be active in the background even as you access and work on your local machine. Another level of safety to prevent those reports from reaching the wrong hands.

The process of downloading a report early morning seemed such a mundane and simple task a few minutes back did it not?

With constant vigil, preemptive measures and software products that are robust and effective, organizations and security leaders constantly battle impending attacks and lapses that could be disastrous.

So, sip on that delightful coffee and go through your report, your download was one of the most secure endeavors done with forethought and planning by your organization.

要查看或添加评论,请登录

bharat raghavan的更多文章

  • Nothing and how "against" positioning is being used by a newbie to compete with Apple

    Nothing and how "against" positioning is being used by a newbie to compete with Apple

    Unified graphics between screens for seamless transition, stripped down animations for a smooth and uniform user…

  • A small write-up on SLBs

    A small write-up on SLBs

    The art of writing involves an apt title that hooks the reader. An acronym often does this given the intrigue around it.

  • Choosing to be the observer

    Choosing to be the observer

    There is something unique about running. Ever since I took it up, it has become so much more than a form of exercise.

  • How Bitcoin solved inflation for all of us

    How Bitcoin solved inflation for all of us

    Whenever I ask my grandma to narrate a story, its about her childhood and how times have changed. You could get an…

  • Three really means Free

    Three really means Free

    My journey down the rabbit hole began 3 years ago. A confessed laggard, crypto currency or even blockchain never really…

  • Meta Matters

    Meta Matters

    It's been a crazy week for anyone having an interest in anything related to emerging tech. With Facebook announcing…

  • Hi, I am Mark's burger

    Hi, I am Mark's burger

    Hi there LinkedIn, My name is not really important here, but you can call me Big Mac. My story really begins on 6th…

  • Who moved my cheese?

    Who moved my cheese?

    There are very few really good business parables that have stood the test of time, and there are fewer ones that have…

  • A perfect run

    A perfect run

    It had to be that kind of a morning. As the gentle breeze that seemed more like a sea side whisper, caressed my ruddy…

  • Letter to an Autowala

    Letter to an Autowala

    Dear k, I know I should have penned this yesterday as a review when you managed to drop me at my house from the bus…

社区洞察

其他会员也浏览了