Page 15 - EngineerIT January 2022
P. 15

ICT – CYBER SECURITY



        the biggest challenge facing security   environments should always be part of the security check list.
        practitioners, requiring effective measures   3. Apply security patches: cyberattacks penetrate networks by leveraging known
        to be put in place:                   vulnerabilities where a patch is available but has not been applied. Organisations must
        1. Prevent attacks before they happen: a   ensure up-to-date security patches are maintained across all systems and software.
          security architecture that enables and   4. Segment your networks: networks should be segmented, applying strong firewall and IPS
          facilitates a single, cohesive protection   safeguards between the network segments. This prevents infections from propagating
          infrastructure is essential, which is what   across the entire network.
          Check Point Infinity delivers. This type   5. Educate employees on cybersecurity: quite often, user awareness can prevent an
          of architecture provides faster, more   attack before it occurs. Take the time to educate your users and ensure that if they see
          comprehensive protection than an    something unusual, they report it to your security teams immediately. User education has
          infrastructure comprised of pieces that   always been a key element in avoiding malware infections.
          don’t work together.               6. Implement advanced security technologies: there isn’t a single silver-bullet technology
        2. Secure every attack surface and    that can protect organisations from all threats and all threat vectors. However, there are
          vector in your business: organisations   many great technologies and ideas available – machine learning, sandboxing, anomaly
          need a single solution that provides   detection, content disarmament and many more. Each of these technologies can be
          broad cybersecurity coverage. This   highly effective in specific scenarios, covering specific file types or attack vectors. Two
          has become critical in today’s multi-  key components to consider are threat extraction (file sanitisation) and threat emulation
          hybrid environment where the        (advanced sandboxing). Each element provides distinct protection, which when used
          perimeter is now everywhere. Email,   together, offer a comprehensive solution for protection against unknown malware at the
          web browsing, servers and storage   network level and directly on endpoint devices.
          are merely the basics. Cybersecurity
          should protect these and much more.   The statistics and data used in this report were detected by Check Point’s Threat
          Mobile apps, cloud and external storage   Prevention technologies, stored and analysed in ThreatCloud. ThreatCloud provides
          are essential, so is compliance of   real-time threat intelligence derived from hundreds of millions of sensors worldwide,
          connected mobile and endpoint devices,   over networks, endpoints and mobiles. ThreatCloud is the brain behind Check Point
          and your growing IoT-device estate.   Software Technologies’ threat prevention power, combining big data threat intelligence
          Workloads, containers, and serverless   with advanced AI technologies to provide accurate prevention to all Check Point Software
          applications on multi- and hybrid-cloud   Technologies customers.                                     n











































        Figure 3



                                                  EngineerIT | January 2022 | 13
   10   11   12   13   14   15   16   17   18   19   20