Fortinet, a global leader in high-performance cyber security solutions, today advised IT leaders in Asia Pacific to hone their situational awareness skills in order to better defend their organizations against cyber threats.

 

Human beings are continually looking for knowledge or information to improve the situations they are in. If we live in a crowded city, for example, we want to know which routes are best to avoid getting stuck in traffic. When we enter a restaurant or cinema, we look for the exits. And when a suspicious looking person enters the room, part of our mind automatically keeps track of him. This behavior is known as situational awareness, and it is second nature to most of us.

 

“When people use IT, however, this behaviour surprisingly doesn’t carry over. They click on dubious links without a second thought, open files they don’t recognize, and connect to wireless networks they are unfamiliar with,” said Jeff Castillo, Fortinet Assistant Regional Director for Southeast Asia & Hong Kong, Country Manager Philippines. “If people could become more situationally aware in their handling of computing devices, they – and the organizations they work for – would be victimized by cyber threats much less often.”

 

Situation awareness in enterprise IT environments start with understanding the organization’s business priorities, risks and threats. IT leaders must be able to frame the issues they are dealing with within short and long-term business objectives, have clear line-of-sight across the organization and technologies, and be able to establish policy and governance for everyone who touches the firm’s data.

 

To achieve cyber situational awareness, Fortinet advises IT leaders in Asia Pacific to focus on four key thrusts:

 

1.Business Mission and Goals. Understand the organization’s business mission, and then align it to those processes and resources that exist to enable that mission. Companies must understand the type of data it uses and generates, and how much the processes that use this data overlap with those of other teams as they learn about and document these processes. Organizations should also prioritize data and systems, determine which have regulations tied to them, and compare their priorities with those teams that share these resources.

 

2. Cyber Assets. Understand and catalog all the assets on the organization’s network, along with any vulnerability they may have. Get to know their profiles, such as what OS and version is installed, what applications reside on those devices, and what data they hold. Once firms gain full knowledge on the devices they own, they need to ensure these devices are securely configured and patched as the vast majority of exploits target publicly known vulnerabilities that are five or more years old. Always prioritize the critical vulnerabilities.

 

3. Network Infrastructure. All devices are connected, which means we need to understand how they are connected, and to what.A single vulnerable device may not matter much, but if it is connected to something critical, the risk level can become very different. Organizations must strive to thoroughly understand their topology because cybercriminals are spending much time and resources to learn it to exploit the vulnerabilities in the system. Understanding how and where devices are connected and the data that flows through them will determine where the risks are, and let organizations implement appropriate policies and countermeasures, including technology solutions that are most suited to protecting their unique environment. These solutions must allow devices to interact, share intelligence, and respond to threats in a coordinated fashion anywhere across the extended network.

 

4. Cyber Threats. Understand the capabilities and tactics of threat actors targeting your organization. Threat actors can include government sponsored cyber espionage, organized crime, hacktivists, insider threats, opportunistic hackers and internal user errors. Organizations need to know which of these threat actors are most likely to be focused on stealing the data that resides in the network.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Silence Trojan: The New Russian-Speaking Hacking Group Hunts for Financial Organizations
Techworld Date Posted: 6 November 2017 4:02 PM | 371 Views
In September 2017 Kaspersky Lab researchers identified a new series of targeted attacks against at least 10 financial organizations in multiple regions including Russia, Armenia, and Malaysia. The hits are being performed by a.... See More
 
Silence Trojan: The New Russian-Speaking Hacking Group Hunts for Financial Organizations
Techworld Date Posted: 4:02 PM | 371 Views
In September 2017 Kaspersky Lab researchers identified a new series of targeted attacks against at least 10 financial organizations in multiple regions including Russia, Armenia, and Malaysia. The hits are being performed by a...See More

 
ASUS Republic of Gamers Showcases Latest Gaming Lineup at CES 2018
Techworld Date Posted: 11 January 2018 1:23 PM | 1086 Views
ASUS Republic of Gamers (ROG) today unveiled its latest lineup of gaming accessories at CES® 2018, including the ROG Strix Flare RGB mechanical keyboard, ROG Aura Terminal addressable RGB controller,. See More
 
ASUS Republic of Gamers Showcases Latest Gaming Lineup at CES 2018
Techworld Date Posted: 1:23 PM | 1086 Views
ASUS Republic of Gamers (ROG) today unveiled its latest lineup of gaming accessories at CES® 2018, including the ROG Strix Flare RGB mechanical keyboard, ROG Aura Terminal addressable RGB controller,See More

 
Costly Cloud Breaches Putting Digital Transformation Strategies at Risk, Finds Kaspersky Lab
Techworld Date Posted: 25 May 2018 2:51 PM | 48 Views
The success of digital transformation projects are being stalled by the fear of the impact and rising costs of breaches associated with “data on the go”. According to new research from Kaspersky Lab, safeguarding.... See More
 
Costly Cloud Breaches Putting Digital Transformation Strategies at Risk, Finds Kaspersky Lab
Techworld Date Posted: 2:51 PM | 48 Views
The success of digital transformation projects are being stalled by the fear of the impact and rising costs of breaches associated with “data on the go”. According to new research from Kaspersky Lab, safeguarding...See More

 
Lenovo Officially Kicks off Highly-Anticipated Legion of Champions Series II Grand Finale
Techworld Date Posted: 27 January 2018 1:20 PM | 442 Views
Lenovo (HKSE: 992) (ADR: LNVGY), the world’s leading PC manufacturer, has officially kicked off the “Legion of Champions Series II” Grand Finale (LoC; former League of Champions).. See More
 
Lenovo Officially Kicks off Highly-Anticipated Legion of Champions Series II Grand Finale
Techworld Date Posted: 1:20 PM | 442 Views
Lenovo (HKSE: 992) (ADR: LNVGY), the world’s leading PC manufacturer, has officially kicked off the “Legion of Champions Series II” Grand Finale (LoC; former League of Champions).See More

 
Transcend Releases Lightning-fast PCIe Solid-state Drive for Mac Computers
Techworld Date Posted: 29 August 2017 3:50 PM | 343 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is proud to announce the release of the JetDrive 820 PCI Express (PCIe) Gen 3.0 solid-state drive (SSD) for Mac computers. The JetDrive.... See More
 
Transcend Releases Lightning-fast PCIe Solid-state Drive for Mac Computers
Techworld Date Posted: 3:50 PM | 343 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is proud to announce the release of the JetDrive 820 PCI Express (PCIe) Gen 3.0 solid-state drive (SSD) for Mac computers. The JetDrive...See More

 
Ensuring Cybersecurity in Today’s Growing Sharing Economy
Techworld Date Posted: 16 September 2017 9:58 AM | 52 Views
Improving telecom infrastructures, broader data services and an increasingly tech-savvy population make the Philippines one of the most robust mobile markets in Asia. The country's digital ecosystem will continue to expand, thanks to a.... See More
 
Ensuring Cybersecurity in Today’s Growing Sharing Economy
Techworld Date Posted: 9:58 AM | 52 Views
Improving telecom infrastructures, broader data services and an increasingly tech-savvy population make the Philippines one of the most robust mobile markets in Asia. The country's digital ecosystem will continue to expand, thanks to a...See More

 
D-Link’s Enhanced Wi-Fi Gigabit Routers, Security Cameras Deliver Improved Connectivity, Security
Techworld Date Posted: 20 March 2018 5:05 PM | 706 Views
Manila, Philippines – D-Link, one of the world’s biggest suppliers of home networking products, matches the growing demand for high-speed connectivity and improved home security with enhanced Wi-Fi gigabit routers and security cameras.. See More
 
D-Link’s Enhanced Wi-Fi Gigabit Routers, Security Cameras Deliver Improved Connectivity, Security
Techworld Date Posted: 5:05 PM | 706 Views
Manila, Philippines – D-Link, one of the world’s biggest suppliers of home networking products, matches the growing demand for high-speed connectivity and improved home security with enhanced Wi-Fi gigabit routers and security cameras.See More

 
Kaspersky Interactive Protection Simulation Online Game Aims to Improve Cybersecurity Cooperation in PH Companies
Techworld Date Posted: 19 July 2018 3:08 PM | 782 Views
Kaspersky Lab conducted its first Kaspersky Interactive Protection Simulation Online training (KIPS Online) with the local technology media recently to highlight the importance of teamwork in corporate cybersecurity.   KIPS Online is a valuable.... See More
 
Kaspersky Interactive Protection Simulation Online Game Aims to Improve Cybersecurity Cooperation in PH Companies
Techworld Date Posted: 3:08 PM | 782 Views
Kaspersky Lab conducted its first Kaspersky Interactive Protection Simulation Online training (KIPS Online) with the local technology media recently to highlight the importance of teamwork in corporate cybersecurity.   KIPS Online is a valuable...See More

Rafael Aquino
Steam Sales: HOW AND WHY
Techworld • By: Rafael Aquino | Date Posted: 14 August 2017 9:30 AM | 59 Views
Steam sales are a massive tip against the balance of the game world. It's why everyone looks into Steam for a cheap game. ("Ooh check that game! OMG! It must be on sale on.... See More
Rafael Aquino
Steam Sales: HOW AND WHY
Techworld • By: Rafael Aquino | Date Posted: 9:30 AM | 59 Views
Steam sales are a massive tip against the balance of the game world. It's why everyone looks into Steam for a cheap game. ("Ooh check that game! OMG! It must be on sale on...See More

 
Get Free Globe Home Wi-Fi with Every Purchase of Selected Lenovo Devices
Techworld Date Posted: 26 September 2018 3:55 PM | 294 Views
As we gear up for the holidays, leading PC developer Lenovo and leading telecommunications provider Globe Telecom team up for an always-connected “Ber” season in a promo.. See More
 
Get Free Globe Home Wi-Fi with Every Purchase of Selected Lenovo Devices
Techworld Date Posted: 3:55 PM | 294 Views
As we gear up for the holidays, leading PC developer Lenovo and leading telecommunications provider Globe Telecom team up for an always-connected “Ber” season in a promo.See More


Power by

Download Free AZ | Free Wordpress Themes