See what networking services are in your area
View our high-level approaches to solving business and technology challenges
Learn how peers in your area are working with CenturyLink
SECURITY AND COMPLIANCE
Hybrid IT and Cloud
Voice and Unified Communications
Managed and IT Services
Get support, access resources, and explore products and services at centurylink.com.
11 Jul 2017 | Derek Lok, Solutions Consulting Director, Asia Pacific
Building an impregnable fortress of cybersecurity seems like a good idea. But in today’s context, this traditional approach is slowly becoming outdated. Buying “bigger and better” security products might seem intuitive, but it might leave security gaps, downtime, and negative impacts to revenue and brand reputation.
At the rate at which threats are evolving, cyberattacks have become the sixth biggest risk to doing business in the region according to the World Economic Forum. About 35 percent of companies in Asia Pacific also fail to go through with digital transformation for fear of losing sensitive data.
The battle lines in cybersecurity are blurring today. As digital transformation ramps up in the region, digital capabilities bring technology and data closer to customers. Mobile, wireless, and IoT technologies are unlocking various possibilities for customer experience, but also causing complications when it comes to tracking the flow of data and protecting it at the various points it is located.
Even in the backend, the rise of hybrid cloud environments make it challenging to distinguish where one network ends, and another begins. The mixture of public and private clouds make it confusing—as well as difficult—to implement effective security measures. As digital transformation changes the way we do business, cybersecurity measures also have to evolve.
Lack of personnel
Talent is also scarce when it comes to filling up cybersecurity positions. Earlier this year, a recent ICT study by National Trades Union Congress’ (NTUC) Future Jobs, Skills and Training Unit also found that cybersecurity is one of the top sought-after jobs in the sector.
With a lack of “soldiers” to build up or man the cybersecurity fortress, it can be challenging to keep track of evolving threats and respond to an attack. In fact, 85 percent of Singaporean CIOs believe that attacks will increase due to a lack of cybersecurity personnel.
Bloated security spending
Acquiring the shiniest toys in cybersecurity technology will not be effective if an organization does not know how to wield them effectively. It will lead to an inefficient use of security budgets. Without an adequate, in-depth understanding of a network, organizations are susceptible to spending blindly.
For instance, an organization might over-invest in technologies like data loss prevention and packet captures without knowing that it has overlooked basic patching. While it perceives that it has deployed new technology to fight today’s threats, it has ignored a fundamental issue which still leaves it vulnerable to attacks.
What organizations need to understand is that it’s not about spending more on cybersecurity. It is about spending smarter. They can conduct a business impact analysis and review their networks and business goals. By prioritizing and identifying security gaps, they will have a clearer view of what security technologies they truly need for maximum impact. This will bring them closer to a proactive cybersecurity approach that will drive faster, secure digital transformation.
Explore other blogs here
The security of Digital Businesses should be a priority for enterprises in 2019. Discover the key trends driving the threat landscape in the New Year — and how you can protect your digital business now.
Asia Pacific is becoming the center of smart cities. But amid the evolving threat landscape, securing them has become much more complex. These are the key issues organizations have to think about.
As enterprises race to provide good customer experiences to get gain competitive advantage, they need to start seeing security as an enabler of customer trust and loyalty. Here’s what organizations can do to digitize without compromising security.