sb-nz logo
Story image

Palo Alto Networks' three top tips for cybersecurity success

04 Oct 2016

Some professionals are becoming jaded about their ability to protect themselves against cyber attacks, particularly as successful attacks are on the rise, Palo Alto Networks has found.

The company says that organisations need to take a prevention-first mindset through three key elements: Technology, people and processes and intelligence sharing. This way, they will be better equipped to deal with threats. “We must assume that not all cyberattacks can be stopped. However, prevention is possible to the point where the number of successful cyberattacks is reduced, making it manageable from a risk perspective," says Sean Duca, vice president and regional chief security officer, Asia Pacific at Palo Alto Networks.

Palo Alto Networks recommends using the following three guidelines to direct your cybersecurity focus:

Technology: Traditional and legacy security aren't reliable anymore, not are manual efforts by IT teams. This and the fact that computing power is cheaper, so is the cost of launching complex attacks. Threat detection and response must be kicked up a notch.

“Harnessing automation and integrated intelligence can continually raise the cost of making an attack successful. This helps to decrease the number of successful attacks," Duca says.

People and processes: Employees and executive teams should continually improve security management processes to prevent successful cyberattacks.

“Many successful attacks involve poor processes or human error. Employees must receive regular training on how to identify cyberattacks and what to do in the event of an attack to help reduce the organisation’s threat surface," Duca says.

Sharing threat intelligence: Sharing with other organisations in real time broadens the knowledge base and can reduce the number of successful attacks, Palo Alto says. Sharing intelligence also means attackers have to conduct unique attacks for every organisation they target, making it more expensive and less appealing for them.

Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More
Story image
Interview: Check Point profiles 5 battles that SOC teams face in 2020
Security operations centres (SOCs) are often the first lines of defence.More
Link image
Data is an organisation's most significant asset - here's how to protect it
Data resilience strategies are becoming more crucial as more value is ascribed to a company's data. If it's not stored securely and cost-effectively, expect problems.More
Story image
APAC organisations struggle to find balance between digital adoption and cybersecurity
Organisations in the Asia Pacific (APAC) region are significantly concerned about security threats, but nevertheless are looking to advance operations through digital adoption.More