Page 101 - Cyber Defense eMagazine September 2022
P. 101

New normal, new problems

            The “new normal” poses several new challenges for cyber security since many businesses have found
            ways to operate virtually.

            Although  stay  at  home  restrictions  have  eased, many  companies still  allow  their  employees to work
            remotely. This has increased the demands and requirements on data storage on the cloud, data security
            and privacy concerns. With remote working becoming a new norm, online data sharing has become the
            main mode of working.


            At its core, the main challenge that we face today is the inability to technologically enforce what and how
            third parties are using the data once it is made available in the public domain.

            Allowing employees to work from home heightens the need to ensure that the data shared is kept secure,
            confidential and tamper proof.

            To prevent any tampering of confidential data, many businesses simply do not share their confidential
            data with partners. This is a key challenge for businesses in the post-pandemic world.

            In Q1 of 2020, when widespread “work from home” schemes were first implemented, there was a 17%
            increase in the number of data breaches. This further underlines the importance of ensuring the security
            of user data for many businesses today.



            Catering to growing demand

            Information sharing offers great opportunities for companies to build more efficient and resilient business
            models. However, many businesses are still hesitant to share their data as the space remains difficult to
            control once the data is made available.

            With 75% of the world’s population projected to have their personal data online by 2023, user data
            security will not only become a responsibility of businesses but a priority for those companies who wish
            to thrive post-pandemic.

            To cater to this online transition, businesses have ramped up their partnerships to collaborate digitally in
            a distributed environment.

            However, this digital world brings with it a host of security risks. Some common causes of cyber breaches
            include using applications that are riddled with vulnerabilities which threaten the integrity and security of
            classified information owned by enterprises.

            To prevent such threats, it is in the firm’s best interest to adopt programs that protect their classified data
            while it is at rest, in motion and in use. To do so, it is important that firms deploy a security-by-design
            approach, whereby applications and services are designed to protect privacy first.








            Cyber Defense eMagazine – September 2022 Edition                                                                                                                                                                                                         101
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   96   97   98   99   100   101   102   103   104   105   106