- Buying new laptops isn’t necessarily the answer to better cybersecurity if you don’t have the right mitigation methods in place.
- Siddharth Vishwanath, the partner and leader of cybersecurity at PwC India, says setting up
virtual machines may be a more cost-effective and secure way for companies to fend offcyberattacks . - In an interview with Business Insider, Vishwanath explains how enterprises — big and small — can set themselves up to protect against
hackers .
“Purchasing hardware or providing software to secure employees’ personal devices (BYOD) will come with additional overhead of deployment, integration, administration and monitoring of devices or software,” he explained. Rather than go about it manually, Vishwanath suggests considering security as a service (SaaS) model.
Instead of buying new devices, shift to the cloud
According to him, businesses can save on costs by leveraging assets that are already there in the cloud. “Such services provide scalability and agility required in current dynamic and challenging times,” he explained. While it may seem like MSMEs are a great risk due to the lack of specialised IT security, large enterprises have a more complex and ever-expanding boundary to cover.
Instead of buying 200
Where do hackers break-in?
Hackers are continuously revamping and building up how they can break into networks and devices, no matter how full-proof security may be. As the cliche goes — the best offence, in this case, is a good defence. Just a more narrow approach, that can focus on the most likely targets, “By concentrating on what I would term chokepoints,” said Vishwanath.
This means covering the basics like the firewall or proxy and Virtual Private Networks (
For employees, that does mean that their company is likely to monitor their traffic to check for malicious connections or emerging attacks vectors — like any new COVID-19 scams.
Just as employees need to adapt to the ‘new normal’, organisations also need to keep their options open. “Backup alone is never an answer,” said Vishwanath. While essential, it’s best to also have next-gen antivirus, network layer scanning and endpoint detection and response (EDR) solutions in place to provide a ‘defence in depth’ for a higher degree of protection.
SEE ALSO:
Cognizant's ransomware attack is making peers like TCS and Infosys nervous — and they are beefing up security
Top cryptocurrency scams of 2019 — and how most hackers got away with it
Wipro confirms phishing attack on its system — 11 other companies unknown