Story image

Take the initiative in defending your data

09 Aug 2017

With news headlines featuring a steady stream of data breaches, leaked emails and global cyberattacks, it’s hard to escape the impression that this threat is escalating. With this growing awareness, New Zealand organisations are increasingly coming to understand that a digital security program is a necessary part of doing business in the modern world.

Despite this new awareness of the threat, for many the solution is less well understood. As a result, defensive strategies are improperly prioritised. Many businesses simply react to security events, rather than preparing for them. Security budgets are misdirected towards shiny toys rather than the IT hygiene fundamentals which have the greatest impact.

When security professionals do get brought in, their effectiveness is limited by organisations who incorrectly believe that placing the tester in a knowledge vacuum to simulate an external attacker is a one-size-fits-all approach.

While organisations with a mature security program can gain value from such exercises, those still developing their security posture may benefit more from closer collaboration with technical experts.

Too often, security professionals are consulted with only when a project is almost complete.Find problems early. Either they incur time and disruption losses in resolving these problems or they accept the risks and proceed with deployment with the intent of finding budget for fixes sometime in the future.

A shift is starting to occur, though. Smaller enterprises are starting to understand what those with more mature information security programs have understood for some time. The cost of retrofitting security to a solution far exceeds that of investing in security review and consultation during the design and planning stages.

Businesses that are in a strong position to defend against the current threat landscape have processes and templates in place to ensure that new systems are built with secure-by-default platforms as a foundation.

Modern organisations bake security into their every operation. They engage with security experts who can provide guidance and context such that their businesses can take the initiative in making informed risk decisions, rather than scrambling to clean up security issues when it is more costly.

Click here to find out more about how Lateral Security can help you.

Web design programmers do an about face – again!
Google is aggressively pushing speed in the mobile environment as a critical ranking factor, and many eb design teams struggling to reach 80%+ speed scores on Google speed tests with gorgeous – but heavy - WordPress templates and themes.
Digital spending to hit US$1.2 trillion by 2022
A recent study by Zinnov shows that IoT spend reached US$201 billion in 2018 while outsourcing service providers generated $40 billion in revenue.
'Iwi Algorithm' can grow Aotearoa's mana
Ngāti Whātua Ōrākei innovation officer Te Aroha Grace says AI can help to combine the values from different cultures to help grow Aotearoa’s mana and brand – and AI is not just for commercial gain.
Dropbox brings in-country document hosting to A/NZ & Japan
Dropbox Business users in New Zealand, Australia, and Japan will be able to store their Dropbox files in-country, beginning in the second half of 2019.
Why 'right to repair' legislation could be a new lease on life for broken devices
“These companies are profiting at the expense of our environment and our pocketbooks as we become a throw-away society that discards over 6 million tonnes of electronics every year.”
Kiwis know security is important, but they're not doing much about it
Only 49% of respondents use antivirus software and even fewer – just 19% -  change their passwords regularly.
Instagram: The next big thing in online shopping?
This week Instagram announced a new feature called checkout, which allows users to buy products they find on Instagram.
Apple's AirPods now come with 'Hey Siri' functionality
The new AirPods come with a standard case or a Wireless Charging Case that holds additional charges for more than 24 hours of listening time.