Fortinet, a global leader in high-performance cyber security solutions, today advised IT leaders in Asia Pacific to hone their situational awareness skills in order to better defend their organizations against cyber threats.

 

Human beings are continually looking for knowledge or information to improve the situations they are in. If we live in a crowded city, for example, we want to know which routes are best to avoid getting stuck in traffic. When we enter a restaurant or cinema, we look for the exits. And when a suspicious looking person enters the room, part of our mind automatically keeps track of him. This behavior is known as situational awareness, and it is second nature to most of us.

 

“When people use IT, however, this behaviour surprisingly doesn’t carry over. They click on dubious links without a second thought, open files they don’t recognize, and connect to wireless networks they are unfamiliar with,” said Jeff Castillo, Fortinet Assistant Regional Director for Southeast Asia & Hong Kong, Country Manager Philippines. “If people could become more situationally aware in their handling of computing devices, they – and the organizations they work for – would be victimized by cyber threats much less often.”

 

Situation awareness in enterprise IT environments start with understanding the organization’s business priorities, risks and threats. IT leaders must be able to frame the issues they are dealing with within short and long-term business objectives, have clear line-of-sight across the organization and technologies, and be able to establish policy and governance for everyone who touches the firm’s data.

 

To achieve cyber situational awareness, Fortinet advises IT leaders in Asia Pacific to focus on four key thrusts:

 

1.Business Mission and Goals. Understand the organization’s business mission, and then align it to those processes and resources that exist to enable that mission. Companies must understand the type of data it uses and generates, and how much the processes that use this data overlap with those of other teams as they learn about and document these processes. Organizations should also prioritize data and systems, determine which have regulations tied to them, and compare their priorities with those teams that share these resources.

 

2. Cyber Assets. Understand and catalog all the assets on the organization’s network, along with any vulnerability they may have. Get to know their profiles, such as what OS and version is installed, what applications reside on those devices, and what data they hold. Once firms gain full knowledge on the devices they own, they need to ensure these devices are securely configured and patched as the vast majority of exploits target publicly known vulnerabilities that are five or more years old. Always prioritize the critical vulnerabilities.

 

3. Network Infrastructure. All devices are connected, which means we need to understand how they are connected, and to what.A single vulnerable device may not matter much, but if it is connected to something critical, the risk level can become very different. Organizations must strive to thoroughly understand their topology because cybercriminals are spending much time and resources to learn it to exploit the vulnerabilities in the system. Understanding how and where devices are connected and the data that flows through them will determine where the risks are, and let organizations implement appropriate policies and countermeasures, including technology solutions that are most suited to protecting their unique environment. These solutions must allow devices to interact, share intelligence, and respond to threats in a coordinated fashion anywhere across the extended network.

 

4. Cyber Threats. Understand the capabilities and tactics of threat actors targeting your organization. Threat actors can include government sponsored cyber espionage, organized crime, hacktivists, insider threats, opportunistic hackers and internal user errors. Organizations need to know which of these threat actors are most likely to be focused on stealing the data that resides in the network.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Nokia 8 Takes Its First Bite of Oreo™
Techworld Date Posted: 28 November 2017 10:24 AM | 232 Views
HMD Global, the home of Nokia phones, is excited to announce that Android™ 8.0 Oreo™ is now available for the Nokia 8. . See More
 
Nokia 8 Takes Its First Bite of Oreo™
Techworld Date Posted: 10:24 AM | 232 Views
HMD Global, the home of Nokia phones, is excited to announce that Android™ 8.0 Oreo™ is now available for the Nokia 8. See More

 
The ASEAN Foundation and SAP Extend Strategic Collaboration to Drive Positive Social Impact in the Digital Economy
Techworld Date Posted: 1 December 2017 4:00 PM | 272 Views
In the photo (L-R) His Excellency Vongthep Arthakaivalvatee, Deputy Secretary General of ASEAN for Socio-Cultural Community, Claus Andresen, President and Managing Director of SAP Southeast Asia, Elaine Tan, Executive Director of the ASEAN Foundation.... See More
 
The ASEAN Foundation and SAP Extend Strategic Collaboration to Drive Positive Social Impact in the Digital Economy
Techworld Date Posted: 4:00 PM | 272 Views
In the photo (L-R) His Excellency Vongthep Arthakaivalvatee, Deputy Secretary General of ASEAN for Socio-Cultural Community, Claus Andresen, President and Managing Director of SAP Southeast Asia, Elaine Tan, Executive Director of the ASEAN Foundation...See More

 
The Rise of Thingbots in the Philippines
Techworld Date Posted: 26 October 2017 1:06 PM | 431 Views
Thingbots, botnets built exclusively from IoT devices, are set to become the infrastructure for a future darknet. This is one of the key findings of F5 Networks’s latest report,. See More
 
The Rise of Thingbots in the Philippines
Techworld Date Posted: 1:06 PM | 431 Views
Thingbots, botnets built exclusively from IoT devices, are set to become the infrastructure for a future darknet. This is one of the key findings of F5 Networks’s latest report,See More

CXO Innovation Summit
Rhea Sanvictores
First Ever CXO Innovation Summit Alights in Queen City of the South
Techworld • By: Rhea Sanvictores | Date Posted: 13 November 2018 11:11 AM | 126 Views
Held from November 9 to 11, 2018, the CXO Innovation Summit was staged at the luxurious Shangri-La’s Mactan Resort and Spa in Lapu-Lapu City, Cebu. Prominent distributor of up-to-date gadgets and devices MSI-ECS spearheaded.... See More
Rhea Sanvictores
CXO Innovation Summit
First Ever CXO Innovation Summit Alights in Queen City of the South
Techworld • By: Rhea Sanvictores | Date Posted: 11:11 AM | 126 Views
Held from November 9 to 11, 2018, the CXO Innovation Summit was staged at the luxurious Shangri-La’s Mactan Resort and Spa in Lapu-Lapu City, Cebu. Prominent distributor of up-to-date gadgets and devices MSI-ECS spearheaded...See More

 
ASUS Republic of Gamers Launches Maximus X and Strix Z370 Series Motherboards
Techworld Date Posted: 19 October 2017 8:37 AM | 534 Views
ASUS Republic of Gamers (ROG) today announced Maximus X and Strix Z370, a diverse collection of ROG Z370 gaming motherboards featuring support for the latest 8th Generation IntelCoreTM processors and designed for a range.... See More
 
ASUS Republic of Gamers Launches Maximus X and Strix Z370 Series Motherboards
Techworld Date Posted: 8:37 AM | 534 Views
ASUS Republic of Gamers (ROG) today announced Maximus X and Strix Z370, a diverse collection of ROG Z370 gaming motherboards featuring support for the latest 8th Generation IntelCoreTM processors and designed for a range...See More

 
Symantec Unveils Industry’s First Neural Network to Protect Critical Infrastructure from Cyber Warfare
Techworld Date Posted: 13 December 2018 11:59 AM | 104 Views
Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today introduced Industrial Control System Protection (ICSP) Neural, the industry’s first neural network-integrated USB scanning station that helps organizations protect critical infrastructure by preventing.... See More
 
Symantec Unveils Industry’s First Neural Network to Protect Critical Infrastructure from Cyber Warfare
Techworld Date Posted: 11:59 AM | 104 Views
Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today introduced Industrial Control System Protection (ICSP) Neural, the industry’s first neural network-integrated USB scanning station that helps organizations protect critical infrastructure by preventing...See More

 
Experience the OPPO “Capture the Real You” Roadshow in SM Megamall Fashion Hall
Techworld Date Posted: 26 April 2018 5:04 PM | 288 Views
After the successful Philippine launch of the OPPO F7, the Selfie Expert brand’s latest flagship smartphone, OPPO has shown its commitment to bring the F7 closer to as many Filipinos as possible with its.... See More
 
Experience the OPPO “Capture the Real You” Roadshow in SM Megamall Fashion Hall
Techworld Date Posted: 5:04 PM | 288 Views
After the successful Philippine launch of the OPPO F7, the Selfie Expert brand’s latest flagship smartphone, OPPO has shown its commitment to bring the F7 closer to as many Filipinos as possible with its...See More

 
Kaspersky Lab Reveals PH Threat Landscape, Advocates Public-Private Collaboration in its First CyberSecurity Summit with the DICT
Techworld Date Posted: 7 August 2017 11:27 AM | 259 Views
The Department of Information and Communications Technology (DICT) Secretary Rodolfo Salalima (second from left) shakes hand with Kaspersky Lab Asia Pacific Managing Director Stephan Neumeier (third from left) during the media briefing for their.... See More
 
Kaspersky Lab Reveals PH Threat Landscape, Advocates Public-Private Collaboration in its First CyberSecurity Summit with the DICT
Techworld Date Posted: 11:27 AM | 259 Views
The Department of Information and Communications Technology (DICT) Secretary Rodolfo Salalima (second from left) shakes hand with Kaspersky Lab Asia Pacific Managing Director Stephan Neumeier (third from left) during the media briefing for their...See More

 
10 Tip to Improve Your Internet Privacy
Techworld Date Posted: 31 July 2018 5:09 PM | 441 Views
Massive data breaches, marketers tracking your every step online, shady people exploring the photos you shared in social networks — the list of digital annoyances goes on and on. However, it’s not completely hopeless:.... See More
 
10 Tip to Improve Your Internet Privacy
Techworld Date Posted: 5:09 PM | 441 Views
Massive data breaches, marketers tracking your every step online, shady people exploring the photos you shared in social networks — the list of digital annoyances goes on and on. However, it’s not completely hopeless:...See More

 
Lenovo Bolsters PH Lineup with New AMD-Powered Devices
Techworld Date Posted: 6 December 2018 4:47 PM | 89 Views
Lenovo is refreshing its product offerings to Filipino customers with the launch of new laptops that run on AMD Ryzen processors. The release is part of the company’s objective of bringing the latest technology.... See More
 
Lenovo Bolsters PH Lineup with New AMD-Powered Devices
Techworld Date Posted: 4:47 PM | 89 Views
Lenovo is refreshing its product offerings to Filipino customers with the launch of new laptops that run on AMD Ryzen processors. The release is part of the company’s objective of bringing the latest technology...See More


Power by

Download Free AZ | Free Wordpress Themes