Logo Header Menu

How digital transformation changes security needs

As companies look to digital transformation, they must look at security transformation as well How digital transformation changes security needs image

Digital technologies are transforming the business world. Growing numbers of companies are adopting internet-of-things (IoT) devices and moving more of their data into cloud environments.

The advent of these technologies is also causing firms to reimagine traditional business models and innovate new ways to leverage data for growth.

While the digital transformation presents a range of opportunities to today’s companies, it also brings challenges. Some of the most prevalent are the evolving security needs that come with expanding one’s digital presence.

According to a recent survey by Fortinet, 85% of chief information security officers view security issues related to digital transformation as having a somewhat to extremely large effect on their companies.

The digital transformation is altering security needs in some fundamental ways. Here are some of the changes to be aware of.

What is digital transformation in business: Everything you need to know

Kicking off Information Age’s Digital Transformation month, we look at everything you need to know about what is digital transformation in business; the challenges, the technologies and above all, how to succeed

Expanded attack surface

The more applications, data and processes move into the digital realm, the more opportunities there are for hackers and other bad actors. There are more potential points of entry, making it difficult for cyber security professionals to catch all vulnerabilities and keep track of all threats.

There’s also the potential for hackers to move laterally through a company’s network once they gain access to one system. This means a network is only as secure as its weakest point. The situation is made even more challenging by siloed security products, which limit visibility into the network.

Higher potential for damage

The potential for damage due to a data breach or hack is also greater than it has ever been. Data is extremely valuable to businesses today, and more devices are now internet-connected, meaning they could be hacked.

Some of these devices and technologies are involved in critical activities. An event in which a cyber attack disrupts some of these activities could have severe implications. For example, the energy grid, hospital equipment and vehicles all now have digital components. Also, the more heavily an organisation depends on digital technologies, the more damaging an attack could be.

Digital transformation – What’s next for business’ biggest buzzword?

Digital transformation is not a new concept – recent years have seen the rapid evolution of technology in business, from the Internet of Things (IoT) and blockchain to chatbots, machine learning and virtual reality. Read here

Uncontained enterprise networks

In the past, many businesses had contained networks and hosted all their IT equipment on-site. Some businesses, especially large ones or those that handle especially sensitive data, still do this. Most companies, however, use some sort of digital applications and may host their servers in the cloud.

This means these companies’ networks are not contained and have connections to the publicly accessible internet. While these networks should have protections that restrict access, the use of digital technologies does introduce the potential for hackers to break through these defences and access companies’ networks.

Constant change

Digital capabilities and other technological improvements have increased the speed at which developers can create and update software. The technology of today changes rapidly, and while this provides benefits, it also makes it more difficult to keep up with security processes.

This increased speed of change makes it easier for security vulnerabilities to slip through. Cyber criminals are also continuously coming up with new methods, meaning security professionals need to work constantly to come up with new ways to provide protection.

Increased sophistication of attacks

Not only are the techniques of hackers changing rapidly, but they’re also becoming more sophisticated. Cyber criminals can use artificial intelligence and other advanced tech just like security professionals can.

One type of AI-enabled attack, called a polymorphic attack, is a significant challenge. These types of attacks can morph to avoid detection by traditional security solutions.

Leadership in the age of disruption: How to rise to digital transformation

Brad Parks, VP of Business Development at Morpheus Data, looks at what it takes to be a leader in the age of disruption. Read here

Cyber security solutions for the digital transformation

What changes should those in charge of cyber security make to account for the effects of digital transformation? Here are a few suggestions:

  • Integrate security systems: Integrating security systems helps improve visibility into a network and aids in managing a larger attack surface.
  • Build in security: Use applications and devices that have built-in security. If building an application, make strong security settings the default option.
  • Provide training to staff: Skills gaps related to digital technologies and cyber security can open up companies to threats. Provide regular training to IT and cyber security personnel to boost performance. In addition, train other staff members in how to recognise emails from scammers and avoid exposing data to threats.
  • Perform regular testing: Conduct regular penetration testing to uncover potential vulnerabilities and opportunities to improve security.
  • Automate cyber security practices: Incorporating automation into security processes can help companies continuously monitor for threats and expand cyber protections, even with limited personnel and resources.
  • Share threat intelligence: If information about a potential threat is uncovered, share it across the organisation so everyone can take steps to minimise risk.

The digital transformation is changing the way businesses operate. One of the areas it’s transforming is cyber security. There are now more potential cyber threats than ever before, and attacks are becoming more sophisticated.

Protecting against these threats requires a proactive, continuously integrated and automated approach to cyber security. It also requires companies to adjust their strategies as the threat landscape continues to evolve.

Latest news

divider
Releases & Updates
The leading customer onboarding and resource management platform on Salesforce

The leading customer onboarding and resource management platform on Salesforce

11 November 2019 / Precursive and Taskfeed have merged to become the leading customer onboarding and resource management platform [...]

divider
People Moves
Shutterstock appoints Peter Silvio as new CTO

Shutterstock appoints Peter Silvio as new CTO

11 November 2019 / Shutterstock, Inc. has today announced the appointment of Peter Silvio as its new chief technology [...]

divider
Retail
The UK retail CIO and CTO must invest in tech to match the online experience

The UK retail CIO and CTO must invest in tech to match the online experience

11 November 2019 / The online experience is seamless and the physical store must match this if the ‘high [...]

divider
Automation
Tech Leaders Summit: How to start your RPA and AI journey

Tech Leaders Summit: How to start your RPA and AI journey

11 November 2019 / During a lively panel discussion at Tech Leaders Summit, business leaders, who’ve embarked on RPA [...]

divider
Energy
Origami Energy appoints Ocado’s CTO Paul Clarke to its advisory board

Origami Energy appoints Ocado’s CTO Paul Clarke to its advisory board

11 November 2019 / Origami, a leading technology provider to the energy industry, is expanding its advisory board team [...]

divider
Blockchain
Demystifying blockchain and identifying use cases

Demystifying blockchain and identifying use cases

8 November 2019 / The 10th anniversary of bitcoin earlier this year rightly prompted a lot of soul-searching amongst [...]

divider
Immersive Technology
Audience immersion and the 5G opportunity

Audience immersion and the 5G opportunity

7 November 2019 / Excitement about 5G’s potential has reached fever pitch. It’s been touted as a game-changer for [...]

divider
Major Contracts
Cloudbees partners with VMware and Atos to harness power of DevOps

Cloudbees partners with VMware and Atos to harness power of DevOps

7 November 2019 / CloudBees has today announced a partnership with Atos and VMware that aims help customers adopt [...]

divider
Releases & Updates
Canonical partners with NVIDIA to accelerate enterprise AI adoption

Canonical partners with NVIDIA to accelerate enterprise AI adoption

7 November 2019 / Canonical and NVIDIA say they have formed the new alliance in response to the challenge [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest