Protecting Your Critical Infrastructure; Is the Multi-Channel and Multi-Level Security Model Best?
Last week, this series looked at the nature of main threats to critical infrastructure from cyberspace , and the steps organizations need to take to protect themselves . Today, the focus will be whether or not the multi-channel and multi-level security model is actually the best approach. While it certainly makes sense for critical systems such as the military, foreign affairs, banking, and law enforcement; in today’s marketplace, this concept may be at odds with the “convenience” sought by the new-age of employees and managers.
For example, with the consumerisation of IT – the proliferation of personal devices within the workplace with access to the corporate network - there is increased probability that corporate data could be breached or at least lost with the associated loss of a personal smart phone, tablet, or other such device. Hence, the increased protections for corporate/confidential information may be eliminated unless strictly enforced security controls are put into place by the corporation and adhered to by the respective device owner.
There are a number of threats from this technology trend that impact the multi-channel security concept, such as: data loss from lost, stolen or decommissioned devices; information-stealing mobile malware; data loss and data leakage through poorly written third-party apps; vulnerabilities within devices, operating systems, design and third-party applications; unsecured Wi Fi, network access and rogue access points; unsecured or rogue marketplaces; insufficient management tools, capabilities and access to API’s (Includes personas) and near-field communications (e.g., Bluetooth) related to proximity-based hacking. Just these threats alone can severely impact a multi-level security model for any organization and going mobile is in vogue worldwide.
Bemused and confused about your options? Then talk to Verizon. Verizon’s security organization brings to the table global capabilities, skill, and expertise to help enterprises achieve their security goals. The Company’s portfolio includes physical security capabilities along with network and Industrial Control System (ICS) security skill sets. This provides customers with the capabilities necessary for the integrated security project such as critical infrastructure protection and cyber security services; governance, risk and compliance; threat management; managed security services; data protection; identity and access management plus professional security services to name but a few.
Protecting your critical infrastructure is of vital importance. But Verizon can help.