As chief information officer at a company that sells insurance solutions, I’m in a unique position because I’m also a customer looking to protect an enterprise from the same cyber threats facing every other company. I need to stay ahead of the same risks as the next guy to protect our environment, build trust and safeguard data.This is no small task, as cyber threats constantly evolve and many remain unknown. You can only be so proactive.
With every endpoint a potential target, detection and response software are important tools. Equip every computer with industry-leading EDR software or consider outsourcing network management to experts. Prepare early by backing up your backups, providing a failsafe in the event of a worst-case scenario. And forget weekly backups; today’s daily data torrents demand a more routine protocol. Also, store backups in a separate physical and network location, far from a data-napper’s grasp.
Developing a robust identity architecture is also critical. Your primary focus should be on risk-based authorization, using emerging capabilities alongside traditional data loss prevention tools to create baselines of normal user behavior. When an anomaly is detected, the system then alerts and restricts access. Modern identity technology helps ensure that users can access only the data and technology they need.