Cyberark sees four key security challenges for 2021

IT security will continue to be one of the key challenges facing all companies in 2021. Although Corona has accelerated digital transformation, security aspects have often been neglected in the process. An end-to-end security strategy for different areas, from the home office to the cloud, is therefore particularly crucial if Cyberark has its way.

IT Security
© depositphotos, Funtap

The change in the world of work, especially with increased cloud and remote use, has also brought new security requirements. Since then, cybercriminals have increasingly targeted attacks via social engineering. The digital transformation has therefore also brought with it new security requirements that will continue to occupy many companies in 2021. Cyberark sees four key challenges for IT security.

1. remote work: It is not necessarily the firewall in the company network that has become more important, but above all protection at the end device level to prevent a malware attack. However, virus protection is not sufficient at this point; according to Cyberark, a "least privilege approach" is more indispensable, in which the access rights of the users to a Minimum including authentication for the user. Equally important is the establishment of multi-factor authentication in companies, propagates the IT security service provider.

2. social engineering: The first step in preventing successful social engineering attacks is to build awareness among employees. Regular sensitization to security risks and continuous training on cybersecurity best practices are "an absolute must".

3. automation: Increasing automation in companies also increases security risks, for example through robotic process automation (RPA) in the business environment or automation tools. Consequently, applications and their programs and automations must also have a suitable rights structure, and access must be secured and controlled in the same way as for people.

4. cloud usage: Increased use of cloud solutions and services also poses security risks. In addition, an organization should use tools that can centrally aggregate thousands of different cloud permissions and identify hidden, misconfigured or unused permissions.

Source: Cyberark

(Visited 72 times, 1 visits today)

More articles on the topic

REGISTER NOW
SECURITY NEWS
Important information on safety topics - competent and practical. Receive exclusive content and news directly to your email inbox.
REGISTER
You can unsubscribe at any time!
close-link