Page 22 - Cyber Warnings
P. 22
Today’s network segmentation provides businesses the ability to create stealth segments that
span the entire network. Network security is initiated at the core and extends wherever it’s
needed; between the company’s hub and server, and across all access points, including email
and individual devices, whether they are in country or 6,500 miles away.
All applications can be isolated and secured individually, yet still run over the same physical
infrastructure. Running business critical applications independently of one another creates a
safety zone that hackers cannot see and therefore cannot access.
Managing application security individually also enables businesses to add or remove segments
securely, without exposing or leaving gaps in the network.
The cautionary tales are all around and should serve as perpetual wakeup calls for businesses
to implement effective strategies to reduce their exposure.
Most recently the World Anti-Doping Agency data breach springs to mind in which 30 top
athletes’ private medical records were exposed.
If we look at Health Care in the U.S. alone, data breaches cost American hospitals roughly $6
billion per year. In fact, Federal health regulators recently announced a record-breaking $5.55
million settlement with one of the nation's biggest health-care systems for breaches that
compromised about 4 million electronic patient records.
Setting aside the actual cost of a data breach – there’s also the intangible costs of damage to
brand, reputation and consumer trust.
The average business may well be able to sustain a one-time breach cost financially, but the
loss of trust and loyalty from consumers and partners can be crippling.
In a world where more employees are insisting on flexible work environments and the ability to
use their own devices, and where customers have an expectation that businesses be “on” and
accessible at all times, the need to ensure security over extended networks and distances will
only increase. It’s not enough to just lock the front door.
About The Author
Jean Turgeon (well known in the industry as ‘JT’) is vice president and
Chief Technologist of Software Defined Architecture within the
Worldwide Sales organization at Avaya.
Turgeon is responsible for driving and delivering the strategy for
Software Defined Architecture, and accelerating adoption of Fabric
Networking solutions in the Enterprise and Midmarket.
22 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide