Securing Valuable Data

Perimeter security is flawed on many levels. Not only are businesses in every industry routinely breached but this model provides the same level of security for all data, irrespective of its value. As a result, when hackers are able to access a network, identifying and extracting valuable data can take less than half a day.

Data is a business’ most valuable asset, so why are security posture treating all data the same by continuing to focus security on the perimeter?

Risk Is Everywhere

No business is immune from the risk of security breach. From power station shut-downs, couriers unable to make deliveries and car retailers having their entire network locked while customers’ personal data, including bank details, is targeted, every business is vulnerable to cyber disruption and ransomware attack. The implications are becoming ever more severe. In addition to the loss of reputation and customer trust, the fines imposed by regulators are becoming ever more punitive. 

The reality for all businesses is that no system is safe when cyber criminals have so much time on their hands - and so many tools at their disposal. Plus, of course, businesses are making it easy, with traditional perimeter-based security models failing to provide adequate protection.  

In a recent Ethical Hacking survey, the most common reason for breach of the perimeter security was ‘vulnerable configurations’; or, to put it another way, human error. And the opportunities for breach become ever greater given the scale of global communications. From IoT to the cloud and highly complex global supply chains, companies have no control over the networks that have become core to every business operation.

Businesses do, however, have control over their data. And with a duty to both the company and customer base to protect that data, it is time to adopt a data first approach to security.

Data First Security

By wrapping security around the data, a business can safeguard this vital asset irrespective of infrastructure. Whether the data is generated within the business or by a third party, whether it is crossing an internal network, travelling via SD-WAN or across a supplier’s infrastructure, by adopting Layer 4, policy-based encryption a business can ensure the data payload is protected for its entire journey.

Encrypting the data means that the company’s most valuable asset has nothing to offer a hacker: all a bad actor can see is crypto-segmented flows of data. They have no idea if the data is payroll, command and control, customer information – or just a social media update. And this is key because bad actors really don’t need much time to identify and extract valuable data.

The Ethical Hacking survey revealed it typically takes less than one hour in 16% of cases and one to two hours for 24% of cases to see what data’s in motion and decide what’s most valuable to steal for a ransomware attack.

With crypto-segmentation, bad actors can spend as long as they like within a business and still be unable to identify any valuable information.

Policy Based Approach 

The policy-based encryption model allows companies to adopt an approach founded on data value, encrypting personally identifying information (PII) such as HR, healthcare or financial data, for example. With this orchestrated, policy-based solution, a business can define a business policy around a specific data set and allow the orchestration to deliver that to the various data protection enforcement points on the network.

Furthermore, as the business’ perception of data value and risk evolves, in response to operational or regulatory change, orchestration can deliver consistent change automatically across the business.

Additionally, this encryption model allows businesses within highly regulated industries, such as utilities, to meet growing expectations that all data must be encrypted irrespective of value. This reflects the new risks created by today’s complex, multi-directional networks and the use of IoT devices such as smart meters, which create a huge attack surface. 

And, because only the payload data is encrypted, while header data remains in the clear, there is minimal disruption to network services or applications. It means the business still has full visibility of all core metrics, including analytics, and it makes troubleshooting an encrypted network easier.

Conclusion

Global regulation is accelerating the need to focus on data, not infrastructure. Not only are growing numbers of vertical markets now affected by new regulatory demands but countries around the world have built on and extended the regulations introduced in the US and EU.

With interconnected global data flows, every business and its directors are far more vulnerable, not only to fines, but also prison terms. It is, therefore, vital to stop relying on perimeter security and look closely at protecting valuable data.

Simon Pamplin is CTO at Certes Networks

You Might Also Read: 

Who Foots the Bill For A Data Breach?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Webinar: Firewall-as-a-service (FWaaS)
The Virtual & Real Cybersecurity Threats In The Metaverse  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

EasyDMARC

EasyDMARC

EasyDMARC deliver the most comprehensive product for anyone who strives to build the most secure possible defence system for their email ecosystem.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.