Insight: Five network security pitfalls that could put your organisation at risk
By Andrew Lintell, Regional Vice President, Northern EMEA at Tufin.
In a world where high-profile data breaches have become the norm, cyber security has quickly become a top priority for organisations of all sizes, in all industries.
Barely a week seems to go by without news of another cyber attack hitting the headlines, prompting businesses to invest heavily in next-generation technologies in an attempt to protect their infrastructure and keep their confidential data secure.
- Insight: Five steps to preparing for digital transformation
- Bayer sells more crop science businesses to BASF for €1.7bn
- Business Chief magazine, Europe edition - click here to read April's issue
One such technology that plays a key role in securing the organisation are network security policies. These rules ensure that only the right people have the right access to the right information, putting the organisation in the best possible position to prevent breaches from occurring.
However, there are several common pitfalls that businesses can fall foul of when implementing their security policies. Here are five of the most prominent that could be leaving your business vulnerable to cyber-attacks.
1 - Not having full perspective of the network
Arguably one of the biggest mistakes a company can make when configuring network security policies is to attempt to put policies in place without first gaining full visibility of the network.
Today’s enterprise networks are vast and complex, and organizations often struggle to gain full visibility. This hinders the ability to put strong policies in place. This is also the case when making necessary changes to those policies across the entire network. For example, if one policy is changed it might have the knock-on effect of reducing security somewhere else. By incorporating a centralised solution that looks across the whole technology architecture, staff can manage all corporate policies through a single console and see the potential implications of policy changes before they are made.
To put it another way, you can’t manage what you can’t measure – so start with visibility.
2 - Disconnected network security policies
This one may sound obvious, but having network security policies in place is self-defeating if they inhibit the business they were intended to help protect in the first place.
Businesses are sensitive to the fact that they need to comply with measures to protect critical assets, but if that prevents them from using the applications essential to getting the job done, they will find ways around these policies. The solution is to provide visibility into how application connectivity is maintained in coordination with underlying network security policies. This approach ensures that the business and security teams are always in sync and aligned to the end goal.
From a management point of view, businesses need to have visibility into their application connections in order to understand the effect that could accompany any network policy changes and their impact.
3 - Leavings holes unplugged
Today’s cyber-attacks are becoming more sophisticated than ever before and new variations of both known and unknown threats are being discovered at an alarming rate.
For example, 18 million new malware samples were discovered in Q3 2016 alone – equal to 200,000 per day – and ransomware attacks on businesses reportedly increased three-fold between January and September 2016.
This means organisations must keep their network policies up to date by carrying out regular patches and system analysis, which requires a centralised management system that looks across the whole IT environment.
Hackers are constantly on the lookout for vulnerabilities, meaning no company - irrespective of size of industry focus - can afford to leave holes unplugged.
4 - Rigid practices
Striking the right balance between security and convenience is not an easy task, but key to ensuring policies are adhered to. Any procedures that significantly hinder an organization’s agility or an employee’s ability to do his or her job will likely result in them being overlooked or ignored.
The other danger is that staff will find a workaround, which can potentially have serious security and compliance implications. This is when ‘shadow IT’ comes into play, where employees use applications at work without the company’s knowledge or control - according to one poll, 78% of IT pros said their end users have set up unapproved cloud services – each of which can represent a potential unmanaged risk.
It is therefore essential that organisations have tools in place that allow them to easily adhere to and manage security policies. Anything that forces people to drastically change the way they work, or results in an organization’s lack of agility, is counterproductive. Increased security interwoven with business agility is the ultimate goal.
5 - Overlooking automation
As complexity in virtually all areas of network security and compliance has increased, automation has grown to become a central component. There are now simply too many change requests to increasingly diverse networks for security teams to keep track of manually, leading to human error and increasing the exposure of the business. The role of automation is now not only a possibility but an essential tool for keeping pace with this degree of change and complexity.
Finally, automation also has a key role to play in network security policy management and continuous compliance. Policy-driven automation ensures that an organization is compliant with internal and industry guidelines at any given point in time. However, it also means that the control plane can be adjusted at policy level and then implemented immediately across the network, further lifting the security level when required through adjustment, and delivered as a business-as-usual task. By connecting security to operations in this way, companies can vastly improve their resistance to constantly evolving threats. This is a critical point in making a tight security posture a reality all the time, rather than “better” for a moment in time.
IT personnel are often stretched to the limit. Network security operations can turn to policy-based automation to reduce complexity, increase visibility, and free up resources to focus on more complex tasks to improve operational efficiencies that directly impact the bottom line of the 21st century-ready business.
Nybl: Saudi Startup to Expand AI Solutions
According to co-founder Nour Alnahhas, nybl was formed for the greater good. A visual data mining and machine learning platform, the platform will help organisations streamline their operations. ‘We wanted to centralise our vision around AI and machine learning’, said Alnahhas. ‘Something not just for profit, but added value. Conscious capitalism’.
Nybl aims to democratise artificial intelligence by making it possible for anyone to build an AI solution. What website builders like Wix and Squarespace did for site design, nybl will do for AI—allowing even non-coders to feel comfortable creating solutions. In fact, Alnahhas calls it a ‘Shopify of AI’, or a third-party platform that helps businesses deliver better service.
With hubs in Kuwait, the UAE, North America, and India, nybl is focused on launching operations in Saudi Arabia, Alnahhas’s home country. When the company first launched, it was difficult to convince Saudi Arabian businesses to work with a startup. Yet now, nybl has proven itself. ‘We had support in the UAE, so now we’re coming back’, said Alnahhas.
Alnahhas has launched a pilot with Saudi Aramco and has slowly built partnerships with paper, heating, HVAC air conditioning, and manufacturing companies. In addition, the Saudi government has started to invest in the Kingdom’s National Strategy for Data and AI, which means that nbyl, as a tech startup, has finally gained credibility.
No War for Talent
One of the most critical parts of nybl’s expansion will be hiring the right individuals. Thankfully, there’s a current surplus of talented researchers, developers, and data scientists within the Kingdom. Like nybl’s Alnahhas—educated at the University of Houston, the Wharton School of Business, and INSEAD— many Saudi Arabians have benefited from government-sponsored education abroad.
Last year, Saudi Arabia signed several partnerships with tech firms to advance the Kingdom’s skills in artificial intelligence. ‘It’s exciting to be in Saudi Arabia where there’s alignment and support’, Alnahhas concluded. ‘You’re getting an increasing talent pool. And even old and big family conglomerates are finally changing to use AI’.