Discover the best practices to prevent, detect and mitigate advanced threats

shutterstock_298402019

The proliferation of new channels of communication BYOD for both personal and business purposes, increases the options of attack and, consequently, the potential of benefits for cyber-criminals. Now more than ever, companies must become aware of the importance of implementing a proper security strategy, acquiring specific tools developed for the protection of digital communications into the enterprise environment.
Email is still the main communication channel at the corporate level, followed by the instant messaging tools that mostly have been developed for the consumer market and which not consider critical requirements like for example, the entire protection of the personal and corporate information that reside into the devices or the international transfer to third parties. The very nature of consumer-orientated IM apps results on CTOs not having real control over them, this makes it quite difficult stopping IM-borne malware, spam or preventing both data theft and inadvertent data leakage.
It is presumed that on the over coming years cybersecurity trends will be marked by:

  • A growth in the number of sophisticated hackers with capacity to develop cyber-attacks becoming increasingly difficult to detect.
  • Ransomware/Cryptoware will continue to be one of the most important threats.
  • Mobile technologies appear as one of the main areas in the emerging panorama of security threats, specifically due to BYOD trends and he risks associated with the loss or theft of the devices.
  • Targeted attacks, defacing website and hijacking social media communication channels, will increase.
  • The volume of personal data that form our “digital fingerprint” as well as the information of a business nature, will have a huge economic value for cybercriminals, who seek links, correlations identities and sell that information to the highest bidder .
  • Greater and clearer definition in terms of data protection law and European Union regulation, which commit each company to assume liability and warranty of data protection.

With all these issues, we see that this is opening new gates to get through and attack security communication, compromise digital assets of companies and cause economic impact.

security strategy - grafico

Companies and public sector should adapt a correct strategy for protecting their digital communications and set up the bases for achieving the following objectives:

  • Maximize the protection of digital communication channels, either email or instant messaging through filtering technologies to detect real-time incidents and allow the blockade.
  • Ensure the data loss prevention through definition of policies to prevent information theft or employees bad practices that compromise the information.
  • Ensure Business Continuity through backup and archiving solutions that retrieve email information in case of system downtime or technical updates.
  • Provide technical resources depending on the demand of the activity, either for reasons of productivity, seasonality or infrastructure requirements. A scalable solution allows each department to provide the resources you need.
  • Be concerns over jurisdiction with current legislation on data protection and industrial property of the company, and look for suppliers able to provide email archive and immutable recovery in real time to comply with legal requirements and internal and external audits.
  • Control the use of BYOD devices to ensure the protection of information that resides in these terminals.

Download the full report from Gartner analysts “Best Practices for Detecting and Mitigating Advanced Threats, 2016 Update”
Gartner, Inc. – G002965http://“Best Practices for Detecting and Mitigating Advanced Threats, 2016 Update” Gartner, Inc. – G00296530 – 29 March 201630 – 29 March 2016