Increasingly aware of the growing threat that cybercrime poses to private businesses and public organisations alike, governments around the world have begun implementing legislation geared towards counteracting it. One of the first to do so was the USA, which brought in the original version of its Cybersecurity Framework in February 2014, initially aimed at critical infrastructure providers.
Health and safety has always been of paramount concern in the workplace – especially in the industrial sector – but the way it is monitored, regulated and complied with is changing. The increasing ubiquity of the digital transformation means that more and more of our business transactions, correspondences and processes are taking place online and via automation, which is advantageous for a whole host of efficiency, budgetary and quality benefits.
With all the furore surrounding the introduction of GDPR earlier this year, another EU edict has comparatively flown under the radar. Nonetheless, the NIS Directive was apparently discussed in the European Parliament on far more occasions than the new data protection act (77 mentions compared to GDPR’s 13) in 2016 and 2017, signalling the importance placed on the subject by Europe’s elite politicians and lawmakers.
Cyber-criminals are outspending businesses by a factor of more than ten to one, according to new data supplied by the World Economic Forum (WEF) and the Centre for Strategic and International Studies (CSIS). The two international watchdogs estimate that hackers are investing as much as $1 trillion (£768.5 billion) in finding new ways to breach online defences.
The first port of call when improving any existing security infrastructure is assessing its current state of proficiency. Recognising areas where the status quo is working well will allow you to devote the requisite time and resources to patching up areas where it isn’t.
With more and more of our interactions and transactions now taking place online, it’s no surprise that cyber-crime is growing by the day. Opportunistic hackers will seek any opportunity to infiltrate your company’s network and access its sensitive information – and the methods employed to do so are evolving and adapting all the time.
As awareness of the risks surrounding cyber-crime increases, many businesses are waking up to the urgent need to protect themselves online from malicious attackers. Enhanced employee training programmes and increased investment in software solutions can go some way to mitigating this threat, but without any way of quantifying your progress, it’s impossible to know how well your business’ online defences are holding up in the face of an ever-shifting threat landscape.
In this project, we were tasked with on-boarding a new customer to our Cyber Security Operations Centre (C-SOC). This would be “just another SOC paper” if it wasn’t for the fact that this particular Customer has an architecture that is exactly what we built the C-SOC for: they are almost exclusively an Azure Platform as a Service (PaaS) operation.