Story image

Managing complex risks to protect enterprise assets

07 Dec 2017

There are two major trends occurring simultaneously in the enterprise space but the challenge to fit both of them together can cripple a business.

Those are the words from Eclipse (a DXC Technology company), which says that both digital transformation and cybersecurity threats are both gaining momentum.

“The digitisation of work has delivered significant productivity improvements and has helped businesses improve their ability to compete in a global marketplace. Automating processes that were previously done manually frees up people to add value elsewhere in the business, so companies are getting a better return on their investment in people and in systems,” comments DXC Eclipse global director Microsoft, Paul Timmins.

Eclipse says that digital systems for all aspects of work are part of a necessary evolution that allows people to be productive in locations other than the office. It also delivers more value in less time and can eliminate (or reduce) errors arising from manual tasks.

Facilitating the changes behind that evolution can be a complex challenges for organisations’ IT teams, Eclipse explains. Those teams are scrambling to protect myriad endpoint devices that connect to the corporate network for all sorts of purposes.

“Insufficient data security can cripple a business. Beyond the direct results of a cybersecurity attack, which can bring systems down and make it impossible for the business to operate, there are far-reaching consequences. These can range from reputational damage to financial losses and this has put IT security on top of on the boardroom agenda,” Timmins says.

Eclipse acknowledges that board members, CEOs and CIOs do recognise that cybersecurity is important to their organisation’s bottom line. As a result, they are demanding more involvement and information so they can keep their business safe from criminals.

The company also says that board members, CEOs and CIOs also understand that digital transformation must include security of all their information assets.

Information assets include data, customer information, trade secrets, inventory and supply chain information. Organisations must not put their customers or suppliers at risk, Eclipse explains.

“While organisations might have standards and policies in place, the reality is people don’t always adhere to them, or they find workarounds. Smart organisations are quickly realising that this is not acceptable anymore, and that they need to take appropriate steps to ensure that information systems are architected from the ground up with security in mind,” Timmins says.

“This is essential for business process transformation and to combat the rising cybersecurity threat,” he concludes.

Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.