Michael Fisher is a full-time analyst, technology evangelist, and Cybersecurity expert; he is active on his blog and Twitter account. We talked with him about a really hot topic for companies: IT Security. As we know, companies everywhere are vulnerable because of cyber attacks and other security threats, but they need to keep the business going uninterrupted. How? And how can Cloud and virtualization help? Read the interview and check the infographic below to find all the answers.
- What is Network Security?
Network Security is a preventative set of processes that protect physical assets and software from threats, misuse and unauthorised access. These processes involve a series of steps outlined to protect the critical functions of the network infrastructure of a business.
- How can companies stay safe in the Digital Transformation Era?
Companies in the Digital Transformation Era can take effective steps to help mitigate the risk of a cyber security data breach. One of the focus points that are practiced on a continuous improvement basis is education.
In a world of connected devices and the pace of technology, we can adapt to such threats by having an up-to-date security policy in place. Using automation tools to assist with patching software and firmware while maintaining objective evidence that the task has been completed. Implementing a secure password policy and using two-factor authentication can help buy you the time to protect against a data breach. Ensuring backups are following the 3-2-1 rule (three copies of the data across two different media and one off-site) can help provide not only a means of disaster recovery but may be one of the items that preserves data after a ransomware attack. Encrypting the data provides a way of means to protect against stolen proprietary data. Monitoring, using a SIEM solution for alerts and anomalies can assist while an attack is in progress which provides good visibility over the network infrastructure.
- Can virtualization help IT managers to improve security?
There’s pros and cons of using a centralized virtual desktop. The pros obviously would include less pain with re-building a physical desktop and it also provides an area where items are standardized. Key here – standardization. It makes it easier to stay up-to-date with software patching because you only need to do it to the various “flavours” of virtual desktops you have in your industry. However, having your eggs all in one basket can be risky. The best approach here would be to follow the steps above and have redundant hardware, including a warm site just in case something goes wrong. The last thing you want is for everyone’s data to be lost because someone clicked on a bad link in their email. This is where education comes into play, spend time with your end users and try to educate them so they understand where to look, what to do and how to report issues.
- Which is, according to you, the safer option for companies: storing data on private Cloud or using big Cloud providers?
Private Cloud providers offer a more ideal approach when needing to comply with regulations such as HIPAA and PCI. The model of a single tenant environment offers the edge to meet your security compliance standards over public clouds today.
However, the public Clouds also put a lot of resources into CyberSecurity these days since they are the leaders of the digital transformation innovation. When in doubt, the most secure place to store your data is in a secure off-site location that is offline and protected by best practice physical security standards.