Fortinet, a global leader in high-performance cyber security solutions, today advised IT leaders in Asia Pacific to hone their situational awareness skills in order to better defend their organizations against cyber threats.

 

Human beings are continually looking for knowledge or information to improve the situations they are in. If we live in a crowded city, for example, we want to know which routes are best to avoid getting stuck in traffic. When we enter a restaurant or cinema, we look for the exits. And when a suspicious looking person enters the room, part of our mind automatically keeps track of him. This behavior is known as situational awareness, and it is second nature to most of us.

 

“When people use IT, however, this behaviour surprisingly doesn’t carry over. They click on dubious links without a second thought, open files they don’t recognize, and connect to wireless networks they are unfamiliar with,” said Jeff Castillo, Fortinet Assistant Regional Director for Southeast Asia & Hong Kong, Country Manager Philippines. “If people could become more situationally aware in their handling of computing devices, they – and the organizations they work for – would be victimized by cyber threats much less often.”

 

Situation awareness in enterprise IT environments start with understanding the organization’s business priorities, risks and threats. IT leaders must be able to frame the issues they are dealing with within short and long-term business objectives, have clear line-of-sight across the organization and technologies, and be able to establish policy and governance for everyone who touches the firm’s data.

 

To achieve cyber situational awareness, Fortinet advises IT leaders in Asia Pacific to focus on four key thrusts:

 

1.Business Mission and Goals. Understand the organization’s business mission, and then align it to those processes and resources that exist to enable that mission. Companies must understand the type of data it uses and generates, and how much the processes that use this data overlap with those of other teams as they learn about and document these processes. Organizations should also prioritize data and systems, determine which have regulations tied to them, and compare their priorities with those teams that share these resources.

 

2. Cyber Assets. Understand and catalog all the assets on the organization’s network, along with any vulnerability they may have. Get to know their profiles, such as what OS and version is installed, what applications reside on those devices, and what data they hold. Once firms gain full knowledge on the devices they own, they need to ensure these devices are securely configured and patched as the vast majority of exploits target publicly known vulnerabilities that are five or more years old. Always prioritize the critical vulnerabilities.

 

3. Network Infrastructure. All devices are connected, which means we need to understand how they are connected, and to what.A single vulnerable device may not matter much, but if it is connected to something critical, the risk level can become very different. Organizations must strive to thoroughly understand their topology because cybercriminals are spending much time and resources to learn it to exploit the vulnerabilities in the system. Understanding how and where devices are connected and the data that flows through them will determine where the risks are, and let organizations implement appropriate policies and countermeasures, including technology solutions that are most suited to protecting their unique environment. These solutions must allow devices to interact, share intelligence, and respond to threats in a coordinated fashion anywhere across the extended network.

 

4. Cyber Threats. Understand the capabilities and tactics of threat actors targeting your organization. Threat actors can include government sponsored cyber espionage, organized crime, hacktivists, insider threats, opportunistic hackers and internal user errors. Organizations need to know which of these threat actors are most likely to be focused on stealing the data that resides in the network.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Cyber and Physical Convergence Is Creating New Attack Opportunities for Cybercriminals
Techworld Date Posted: 8 March 2019 1:57 PM | 84 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated, and automated cybersecurity solutions, has announced the findings of its latest quarterly Global Threat Landscape Report.. See More
 
Cyber and Physical Convergence Is Creating New Attack Opportunities for Cybercriminals
Techworld Date Posted: 1:57 PM | 84 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated, and automated cybersecurity solutions, has announced the findings of its latest quarterly Global Threat Landscape Report.See More

 
Parental Police: Being ‘bad cop’ Isn’t Shielding Kids from Online Threats
Techworld Date Posted: 25 April 2018 4:45 PM | 363 Views
The risks associated with growing up in an online world are not only giving parents a headache, but the time their children are spending online is a real cause for concern. As a result,.... See More
 
Parental Police: Being ‘bad cop’ Isn’t Shielding Kids from Online Threats
Techworld Date Posted: 4:45 PM | 363 Views
The risks associated with growing up in an online world are not only giving parents a headache, but the time their children are spending online is a real cause for concern. As a result,...See More

 
Kaspersky Lab: PH is 9th Most Attacked Online, Web Threats Hit All-Time High
Techworld Date Posted: 13 August 2018 3:38 PM | 166 Views
The Philippines is now the ninth most attacked country worldwide in terms of online threats, according to a report from cybersecurity company Kaspersky Lab.. See More
 
Kaspersky Lab: PH is 9th Most Attacked Online, Web Threats Hit All-Time High
Techworld Date Posted: 3:38 PM | 166 Views
The Philippines is now the ninth most attacked country worldwide in terms of online threats, according to a report from cybersecurity company Kaspersky Lab.See More

 
Industry Leading Technology Partners Join the Fortinet Security Fabric Ecosystem
Techworld Date Posted: 23 November 2017 10:28 AM | 305 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today announced the addition of 11 industry-leading information technology providers to its Fabric-Ready Partner Program. See More
 
Industry Leading Technology Partners Join the Fortinet Security Fabric Ecosystem
Techworld Date Posted: 10:28 AM | 305 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today announced the addition of 11 industry-leading information technology providers to its Fabric-Ready Partner ProgramSee More

 
ADATA and XPG to Showcase Latest Innovations at Computex Taipei 2018
Techworld Date Posted: 25 May 2018 3:27 PM | 305 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND flash products, today announced that it will be showcasing its latest products at Computex 2018 Taipei (Taipei Nangang Exhibition Center, 1F, booth I0608),.... See More
 
ADATA and XPG to Showcase Latest Innovations at Computex Taipei 2018
Techworld Date Posted: 3:27 PM | 305 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules and NAND flash products, today announced that it will be showcasing its latest products at Computex 2018 Taipei (Taipei Nangang Exhibition Center, 1F, booth I0608),...See More

 
Master SSDs the Easy Way with the Plextor Newly-Launched Plextool NVMe Edition
Techworld Date Posted: 31 May 2018 10:25 AM | 318 Views
PLEXTOR, a global leading brand of high-performance digital storage devices, has launched the latest generation of the SSD toolbox, the Plextool NVMe Edition, which is designed for Plextor NVMe SSDs. The new toolbox provides.... See More
 
Master SSDs the Easy Way with the Plextor Newly-Launched Plextool NVMe Edition
Techworld Date Posted: 10:25 AM | 318 Views
PLEXTOR, a global leading brand of high-performance digital storage devices, has launched the latest generation of the SSD toolbox, the Plextool NVMe Edition, which is designed for Plextor NVMe SSDs. The new toolbox provides...See More

 
Next Generation of Kaspersky Private Security Network: Extensive Threat Intelligence within the Network Walls
Techworld Date Posted: 12 September 2017 1:24 PM | 331 Views
Kaspersky Lab is introducing its next generation of Kaspersky Private Security Network, a private version of Kaspersky Security Network that allows enterprises to boost their detection speed with access to real-time global threat intelligence.... See More
 
Next Generation of Kaspersky Private Security Network: Extensive Threat Intelligence within the Network Walls
Techworld Date Posted: 1:24 PM | 331 Views
Kaspersky Lab is introducing its next generation of Kaspersky Private Security Network, a private version of Kaspersky Security Network that allows enterprises to boost their detection speed with access to real-time global threat intelligence...See More

 
Online Financial Cybercrime Victims Struggle to Recover All Their Lost Money
Techworld Date Posted: 31 January 2017 3:29 AM | 389 Views
Each year thousands of Internet users become victims of a cybercrime that leaves them out of pocket.. See More
 
Online Financial Cybercrime Victims Struggle to Recover All Their Lost Money
Techworld Date Posted: 3:29 AM | 389 Views
Each year thousands of Internet users become victims of a cybercrime that leaves them out of pocket.See More

Frank Emmanuel Trazo
Tiny Survivor in a Big, Dark World
All About Gaming • By: Frank Emmanuel Trazo | Date Posted: 9 September 2017 1:17 PM | 327 Views
Every child has their own fear of the unknown since they have not yet understood the world. As they grow up, those fears fade away while gaining wisdom. Despite achieving enlightenment through experiences in.... See More
Frank Emmanuel Trazo
Tiny Survivor in a Big, Dark World
All About Gaming • By: Frank Emmanuel Trazo | Date Posted: 1:17 PM | 327 Views
Every child has their own fear of the unknown since they have not yet understood the world. As they grow up, those fears fade away while gaining wisdom. Despite achieving enlightenment through experiences in...See More

 
Millennials Need More than Just a Smartphone
Techworld Date Posted: 24 August 2017 11:58 AM | 734 Views
Millennials know what they want when it comes to smartphones. These highly-digital individuals no longer choose their device solely on looks. Nowadays, what drives their choice is whether the smartphone allows them to capture.... See More
 
Millennials Need More than Just a Smartphone
Techworld Date Posted: 11:58 AM | 734 Views
Millennials know what they want when it comes to smartphones. These highly-digital individuals no longer choose their device solely on looks. Nowadays, what drives their choice is whether the smartphone allows them to capture...See More


Power by

Download Free AZ | Free Wordpress Themes