Keeran Networks Blog

    National Cybersecurity Awareness Month: Let’s Review How Cybersecurity Have Transitioned!

    Oct 11, 2019 2:30:00 PM Keeran Networks National Cybersecurity Awareness Month, Reviewing Cybersecurity

    It’s October, and it’s National Cybersecurity Awareness Month.

    Our team was reading a lot of articles to amp the cybersecurity solutions recently. There are many great articles to increase your knowledge on cybersecurity as well.

    However, we at Keeran Networks want to take it as a time to reflect.

    Let’s just review where we’ve been and how far we’ve come?

    Another thing that we want to do in this post is to study the trends in cybersecurity, look for challenges and research for opportunities.

    From Subtlety to Dependence

    From using in a very subtle way to becoming reliant on it, our transition in use of technology has been broad. The little subtleties now have made us dependent on technology. Think about it; access to data is highly disruptive when we don’t have it.

    For example, we don’t use printed maps anymore. What if maps on our devices don’t work anymore, we’ll be lost literally. When technology isn’t available, we feel ‘out of the loop.’ This means that we expect 100% connectivity, and we are dependent on it.

    Cybersecurity Transitions in Last Three Years

    If we count, the last three years have been crucial. Since 2017, three major transitions have occurred which have defined the complications of cybersecurity globally. After these transitions came into effect, security professionals started feeling the pressure because they now are being scrutinized by a number of organizations.

    Let’s discuss some of these transitions that pushed for improved security solutions in the last three years:

    1. Technology

    Before 2017, IT built and processed most of the organization’s technology infrastructure. Technology personnel would spend on different security products and hoped it would work. Apart they would purchase best-of-breed products and managed them reactively.

    Most people started feeling the need for cybersecurity. However, organizations had no idea what solutions could net better results. Plus, how much value they will get from a particular solution.

    Brainstorming led to further dilemmas. For instance, if integration was the best strategy? Or, should companies simply buy technology from the best brand name?

    As we are approaching the end of 2019, most IT teams now build, buy and run security using a “best-of-integrated” architecture approach. The professionals now emphasize visibility, controls, measures and a proactive approach to security to drive efficacy and value.

    2. Regulations and Customer Requirements

    We all can coincide that laws, regulations and customer requirements have a great influence on how a technology service provider would serve to its clients. In Canada, we have PIPEDA, and globally there has been a formalization of laws and regulations, including GDPR, Australian Government Protective Security Policy Framework, California Consumer Privacy Act, to name a few. All these have driven great security and reform.

    The impact of the regulations had been wide, especially for organizations that have global operations. Corporate and government leaders are being held accountable. The good thing is that we are now driven away from ‘do-it-yourself’ conflicting regulations. Now the rules are set to country, inter-country and international use standards.

    This transition, in many respects, was long needed. It had been especially helpful in highlighting the implications of mishandling data and privacy through significant fines and executive firings.

    What’s best is that many had been caught off guard!

    3. Internal oversight

    Think about the past; you would know how cybersecurity was mainly limited to engineering and computer science discipline. There were no specialist security teams because it was believed that they would suppress innovation. Most businesses were self-governing with inconsistent levels of oversight.

    However, today, oversight shifts from executive leadership to the CEO, the board of directors and shareholders. There is a standard practice to ensure proper governance. As the regulatory landscape is tightening its grip, there had been a response from within as well. Organizations now lay higher emphasis on accountability — also, the criticality of the technology matters.

    You can now imagine how these three transitions, which came in a really short period of time, convoluted the cybersecurity scene. Now organizations have to determine their internal security strategies, face the challenges, deliver net value and understand how to be safe and secure all around the year.

    Future Demands

    Today we are 10x of what we were in 2000 – around 4 billion users globally! Everything is connected and generating data. We know this will have a significant impact in the next few years.

    What has been estimated – by next year, there will be 200 billion devices on-air,’ which includes cars, telemetry, sensors and a multitude of other connected devices. Also, the number of vendors creating IoT-connected technology is growing probably 3-4X every year.

    By 2021, cybercrime is estimated to be a $6 trillion industry (a very profitable industry!). This can convey the depth of the challenge – how we all face the challenge and why we need to work together.

    If you are a government, company, or individual, Keeran Networks offer comprehensive cybersecurity solutions to tackle challenges around product assurance, cloud assurance, IoT, lawful intercept, data protection, privacy and alike. We help you revise your cybersecurity strategy and help you understand how data is shared and how systems are built.

    If you need to talk more about the security solutions needed for your firm, contact us!

    Keeran Networks

    Written by Keeran Networks