This article originally appeared on the NETSCOUT blog. Click here to read the original in its entirety.
The need for organizations and government agencies to shift and evolve quickly in light of the COVID-19 pandemic resulted in large-scale change for remote access architectures, as well as for cloud and cloud-delivered services. In many cases, there was increased adoption of software-as-a-service (SaaS) models.
Of course, with these significant changes have come heightened cybersecurity risks. Cyberattackers are taking advantage of shifts in business connectivity, finding new ways to exploit security vulnerabilities. And these vulnerabilities are still present as we transition back to normal, post-pandemic.
This evolving threat environment has made it necessary to increase vigilance related to cybersecurity. The recently published white paper “Cyber Security After the Pandemic,” from HardenStance, outlines four important cybersecurity trends that government agencies need to keep in mind in this post-pandemic business environment.
1. Security must be part of your corporate culture.
Security and business continuity planning should be ingrained in every enterprise’s corporate culture. This planning should include a cyberattack response plan and other “war-gaming” activities. In addition to creating a rapid response plan, it is advisable to conduct extensive employee training to stand as a line of defense against cyberattacks. Good cybersecurity practices must be reinforced across all functions of every organization. Leadership should set an example, demonstrating a commitment to security that sets a tone for the business.
For some organizations, the chief information security officer (CISO) is increasingly taking on an elevated role such that in some organizations the CISO’s role is on a par with the Chief Information Officer’s (CIO’s) now. Consistent with that the role has tended to become more proactive and more tightly coupled with Business Continuity Planning (BCP) In some companies, the role could become merged along with CIO, BCP, and other roles into a unified function of digital process officer or cloud technology officer tasked with greater accountability across the business.
Another important cybersecurity best practice is threat intelligence sharing. Organizations can learn a lot by engaging in sharing within peer industries.
2. Security at the edge is increasingly important.
As work has largely shifted to remote, many enterprises have come to rely on VPN architectures for connectivity to vital systems and applications. However, the security governing these VPNs may not be sufficient. This has led organizations to substitute their VPN with SD-WAN. Over the past few years, many SD-WAN vendors have integrated security controls into their portfolios. In addition, the emerging secure access service edge (SASE) solutions are unifying network and network security into a single cloud service that provides much-needed connectivity and device security at the edge.
3. Segmentation and microsegmentation requirements may be emerging.
The HardenStance white paper predicts that in the near future, more integrated approaches to addressing the segmentation of home networks will become prevalent. The paper also anticipates “accelerated investment in vendor roadmaps to meet the segmentation and micro-segmentation requirements of all legitimate stakeholders in the data and applications that run on personal devices.”
4. There’s a continuing need to combat ransomware attacks.
As ransomware attacks continue to target enterprises, several industry initiatives are underway to combat this scourge. Security vendors, industry associations, business organizations, and governments are increasingly working together to put measures in place to curtail these attacks. One such measure under consideration is extending Know Your Customer (KYC) transparency rules in financial transactions to include cryptocurrency transactions. These forms of payment are the primary choice of ransomware attackers because they are untraceable, so new KYC rules may act as a powerful impediment. Enterprises should strongly support efforts such as these.
To learn more about the state of cybersecurity in a post-pandemic world, click HERE to download a complimentary copy of the white paper, “Cyber Security After the Pandemic.”