Page 15 - EngineerIT January 2022
P. 15
ICT – CYBER SECURITY
the biggest challenge facing security environments should always be part of the security check list.
practitioners, requiring effective measures 3. Apply security patches: cyberattacks penetrate networks by leveraging known
to be put in place: vulnerabilities where a patch is available but has not been applied. Organisations must
1. Prevent attacks before they happen: a ensure up-to-date security patches are maintained across all systems and software.
security architecture that enables and 4. Segment your networks: networks should be segmented, applying strong firewall and IPS
facilitates a single, cohesive protection safeguards between the network segments. This prevents infections from propagating
infrastructure is essential, which is what across the entire network.
Check Point Infinity delivers. This type 5. Educate employees on cybersecurity: quite often, user awareness can prevent an
of architecture provides faster, more attack before it occurs. Take the time to educate your users and ensure that if they see
comprehensive protection than an something unusual, they report it to your security teams immediately. User education has
infrastructure comprised of pieces that always been a key element in avoiding malware infections.
don’t work together. 6. Implement advanced security technologies: there isn’t a single silver-bullet technology
2. Secure every attack surface and that can protect organisations from all threats and all threat vectors. However, there are
vector in your business: organisations many great technologies and ideas available – machine learning, sandboxing, anomaly
need a single solution that provides detection, content disarmament and many more. Each of these technologies can be
broad cybersecurity coverage. This highly effective in specific scenarios, covering specific file types or attack vectors. Two
has become critical in today’s multi- key components to consider are threat extraction (file sanitisation) and threat emulation
hybrid environment where the (advanced sandboxing). Each element provides distinct protection, which when used
perimeter is now everywhere. Email, together, offer a comprehensive solution for protection against unknown malware at the
web browsing, servers and storage network level and directly on endpoint devices.
are merely the basics. Cybersecurity
should protect these and much more. The statistics and data used in this report were detected by Check Point’s Threat
Mobile apps, cloud and external storage Prevention technologies, stored and analysed in ThreatCloud. ThreatCloud provides
are essential, so is compliance of real-time threat intelligence derived from hundreds of millions of sensors worldwide,
connected mobile and endpoint devices, over networks, endpoints and mobiles. ThreatCloud is the brain behind Check Point
and your growing IoT-device estate. Software Technologies’ threat prevention power, combining big data threat intelligence
Workloads, containers, and serverless with advanced AI technologies to provide accurate prevention to all Check Point Software
applications on multi- and hybrid-cloud Technologies customers. n
Figure 3
EngineerIT | January 2022 | 13