The five step framework for data security and defence at Vehere's solutions
The frequency and sophistication of cyber-attacks will most assuredly increase in velocity and scope in 2017, with recent news stories revealing that cyber criminals have reaped a thirty-five-fold increase in their earnings from ransomware attacks in 2016. It is high time that businesses pay heed to this growing menace, as ransomware evolves and mutates into an ever-increasing threat to organisations of virtually every shape and size.
Vehere, a technology and innovation leader specialising in products and solutions for Homeland Security, Defence and Cyber Security reinforces the cyber defence systems of Government establishments and leading businesses. Vehere’s cyber defence solutions focus on early detection, investigation and instant actionable insights to counter cyber-attacks such as ransomware, data breaches and advanced persistent threats.
Vehere’s team of cyber security experts have reviewed the recent spate of cyber-attacks that have happened globally and finds the adoption of NIST’s Cyber Security Framework an apt fit for securing enterprises’ assets. The framework outlines the following functions:
Identify: Develop your understanding to manage the cybersecurity risk to your organisations systems, assets, data, and capabilities. Ensures understanding of the business context, identification of the resources that support critical functions and their related cybersecurity risks. This step is designed to enable your organisation to focus and prioritise its efforts, consistent with its risk management strategy and business needs.
Protect: Develop and implement the appropriate safeguards to ensure on-demand accessibility of critical digital data. Supports the ability to limit or contain the impact of a potential cybersecurity event. This function may include procedures such as Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology.
Detect: Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Warrants the continuous monitoring of Anomalies and Events.
Respond: Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Supports the ability to contain the impact of a potential cybersecurity event. Outcomes of this function typically includes Response Planning; Communications; Analysis; Mitigation; and Improvements to the system.
Recover: Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. Recovery Planning; Improvements; and Communications form the backbone of this function ensuring timely recovery to normal operations and reducing the impact of the breach.
Ensuring your organisations’ data security requires a thorough approach that only an expert in this domain can advise you on.
Recent PostsSee All
Log in to leave a comment!