IT disaster recovery, cloud computing and information security news

According to recent findings from the Ponemon Institute, a considerable 83 percent of respondents believe their organization is at risk because the intricacy of business and IT operations. Andrew Lintell looks at the issue and how organizations can improve security in complex networks.

Complexity has very much become the norm for today’s businesses. The rapid rise in the adoption of public, private and hybrid cloud platforms, combined with hugely intricate networks consisting of a growing number of network devices and the rules that govern them, means network architectures are constantly evolving.

This rate of development presents a huge number of opportunities for businesses, including the ability to offer new, innovative services, work in more efficient ways and achieve greater business agility. However, it is also resulting in significantly increased levels of complexity for IT teams, which makes staying secure a real challenge.

Indeed, complexity is now viewed as one of the leading risk factors impacting cybersecurity as the above quote from a Ponemon Institute survey shows. In the same survey nearly three-quarters (74 percent) of respondents citing a need for a new IT security framework to improve their security posture; businesses need to find a way to deal with this complexity and the risks it presents.

Ultimately, it comes down to efficiently managing a complex web of solutions, while also keeping cyber defences / defenses intact.

Patched up

When it comes to maintaining security, one of the biggest issues facing businesses today can be best visualized through a ‘patchwork quilt’ analogy. Not only are networks increasing in size, firms are also being faced with the challenge of figuring out how to patch together several different systems and services from a wide range of vendors, all of which have distinctive features and capabilities.

The sheer quantity of tools and services being used across heterogeneous environments – multi-vendor and multi-technology platforms, physical networks and hybrid cloud – means a larger attack surface. As the attack surface grows, gaps can appear where attackers can find their way inside the network. And, without true visibility across the entire architecture and a clear view of each piece of technology, it’s difficult to find and close those gaps.

The services and applications in these various systems are also likely to require different security policies, further adding to the complexity. For example, changing one security policy could have implications elsewhere, and without proper visibility, IT teams aren’t always aware of how one change impacts the entire network. Not only can this have security repercussions, but it can also have a negative impact on business continuity. But it’s not just the technical side of things that businesses should be solely concerned with. The human factor of security also must be addressed.

People problems

It has become clear that the complexity issue is further heightened by the fact that today’s IT security teams are often understaffed and may not have the required levels of expertise to effectively deal with cyber threats.

The so-called ‘skills gap’ has been a widely discussed topic in cyber security and one that is becoming more prevalent as cybercriminals expand their capabilities, and corporate environments become more intricate. As a result, many businesses are lacking the skilled information security personnel needed to securely manage their complex networks.

Human error and misconfiguration risks are also more prevalent than ever. The likes of security lapses, improper firewall management and vulnerabilities being overlooked are all very real concerns that, due to the complexity of modern networks, can become commonplace.

Addressing the challenges

To address these challenges, businesses need to be able to streamline the management of security policies. By using a centralised policy management tool that looks across the entire network and automatically flags policy violations, the task for IT teams will be significantly simplified, giving them greater levels of visibility and control.

Furthermore, policy-driven automation can be used to ensure a company’s security strategy is consistent across the whole organization, while also being able to identify high-risk or redundant rules with a greater degree of accuracy than through manual efforts. This way, businesses can continue to develop their infrastructures and grow their businesses without having to worry about opening themselves up to security risks.

From a people point of view, carrying out reviews of existing rules and policies is a tedious and time-consuming task to do manually, which can easily result in mistakes being made. But, an automated tool can remove the threat of human error. It can also complete this job in a fraction of the time, thereby making IT teams more efficient and freeing them up to perform higher level functions that increase the business’s overall security.

Coping with complexity is a very real problem for IT security teams, but it is one that can be overcome. By embracing automation, organizations can be sure that nothing will fall through the cracks and, even when a new piece of software is introduced, the overall system will remain as secure and agile as possible.

Businesses addressing the technical complexity and the human factor of corporate networks can continue to grow and add new services, safe in the knowledge that their defences/defenses intact are stronger than ever.

The author

Andrew Lintell is Regional Vice President, Northern EMEA, Tufin. Andrew joined Tufin as Regional Vice President of Northern Europe in April 2016. With 18 years of IT security experience under his belt, Andrew has held senior EMEA management positions for established software vendors including Microsoft, HID Global and Kaspersky Lab. During this time, Andrew was also co-founder and CEO of leading online community moderation and brand management company, Crisp Thinking.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.