Women In Security Magazine Issue 12

Page 114

REUT WEITZMAN

TAKING A PROACTIVE APPROACH TO CYBERSECURITY By Reut Weitzman, Manager, Cyber Security Services at Sygnia

In today’s digital world, data security is crucial

Ransomware readiness is a state that must be

regardless of what type of business you are in.

continually maintained. It is not a one-time event. Therefore, a cybersecurity plan should be a

Data is what businesses rely on to make decisions,

living document that is regularly updated as new

stay competitive and grow. But as our dependence

threats emerge and new technologies become

on data has increased, so has the risk of data being

available. Businesses must keep abreast of the

compromised by cyber breaches, especially by the

latest cybersecurity news to be familiar with threat

accelerated transition to remote work. That is why

actors’ tools, techniques and procedures and

it is more important than ever for CISOs to be better

modify their incident response plan to stay ahead

prepared to respond should an incident occur. Here is

of the curve. Identify the measures needed to

a close look at how organizations can take a proactive

enhance resilience across the entire attacker kill

approach to cybersecurity.

chain: from penetration through lateral movement to execution.

Cyberattacks come in different forms of

114

compromising data through networks. With the rise of

Make sure to allocate the resources and budget

remote working in many businesses, there has been

necessary to enhance the organization’s ability to

a surge in ransomware attacks. Ransomware is a

prevent, detect, respond to and recover from all

type of malware that encrypts a victim’s files enabling

phases of the attack, and keep your up-to-date plan

the attacker to demand a ransom payment to

effective. Many organizations fail to execute their

decrypt them. This cyber-extortion attack can have a

cybersecurity plan, usually due to lack of oversight

devastating impact on a business, producing financial

necessary to ensure proper implementation. Set

loss, reputation damage, operational disruption and

up an assurance process to measure the controls

compliance failures. In severe cases of sensitive

effectiveness, track and test the plan to ensure

data or mission-critical systems being impacted,

it meets key performance indicators (KPIs) and

businesses have had to shut down completely due to

key risk indicators (KRIs) that correlate with the

a ransom attack.

business strategy.

W O M E N I N S E C U R I T Y M A G A Z I N E

J A N U A RY • F E B R U A RY 2023


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Women In Security Magazine Issue 12 by source2create - Issuu