Fortinet, a global leader in high-performance cyber security solutions, today advised IT leaders in Asia Pacific to hone their situational awareness skills in order to better defend their organizations against cyber threats.

 

Human beings are continually looking for knowledge or information to improve the situations they are in. If we live in a crowded city, for example, we want to know which routes are best to avoid getting stuck in traffic. When we enter a restaurant or cinema, we look for the exits. And when a suspicious looking person enters the room, part of our mind automatically keeps track of him. This behavior is known as situational awareness, and it is second nature to most of us.

 

“When people use IT, however, this behaviour surprisingly doesn’t carry over. They click on dubious links without a second thought, open files they don’t recognize, and connect to wireless networks they are unfamiliar with,” said Jeff Castillo, Fortinet Assistant Regional Director for Southeast Asia & Hong Kong, Country Manager Philippines. “If people could become more situationally aware in their handling of computing devices, they – and the organizations they work for – would be victimized by cyber threats much less often.”

 

Situation awareness in enterprise IT environments start with understanding the organization’s business priorities, risks and threats. IT leaders must be able to frame the issues they are dealing with within short and long-term business objectives, have clear line-of-sight across the organization and technologies, and be able to establish policy and governance for everyone who touches the firm’s data.

 

To achieve cyber situational awareness, Fortinet advises IT leaders in Asia Pacific to focus on four key thrusts:

 

1.Business Mission and Goals. Understand the organization’s business mission, and then align it to those processes and resources that exist to enable that mission. Companies must understand the type of data it uses and generates, and how much the processes that use this data overlap with those of other teams as they learn about and document these processes. Organizations should also prioritize data and systems, determine which have regulations tied to them, and compare their priorities with those teams that share these resources.

 

2. Cyber Assets. Understand and catalog all the assets on the organization’s network, along with any vulnerability they may have. Get to know their profiles, such as what OS and version is installed, what applications reside on those devices, and what data they hold. Once firms gain full knowledge on the devices they own, they need to ensure these devices are securely configured and patched as the vast majority of exploits target publicly known vulnerabilities that are five or more years old. Always prioritize the critical vulnerabilities.

 

3. Network Infrastructure. All devices are connected, which means we need to understand how they are connected, and to what.A single vulnerable device may not matter much, but if it is connected to something critical, the risk level can become very different. Organizations must strive to thoroughly understand their topology because cybercriminals are spending much time and resources to learn it to exploit the vulnerabilities in the system. Understanding how and where devices are connected and the data that flows through them will determine where the risks are, and let organizations implement appropriate policies and countermeasures, including technology solutions that are most suited to protecting their unique environment. These solutions must allow devices to interact, share intelligence, and respond to threats in a coordinated fashion anywhere across the extended network.

 

4. Cyber Threats. Understand the capabilities and tactics of threat actors targeting your organization. Threat actors can include government sponsored cyber espionage, organized crime, hacktivists, insider threats, opportunistic hackers and internal user errors. Organizations need to know which of these threat actors are most likely to be focused on stealing the data that resides in the network.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Nokia 6 and Nokia 8110 4G Are Now Out in Philippine Market
Techworld Date Posted: 17 May 2018 10:46 AM | 31 Views
Because we listen to our fans, the new Nokia 6 is made even better to become more than just a smartphone that processes, clicks and communicates, but rather a companion you can trust, depend.... See More
 
Nokia 6 and Nokia 8110 4G Are Now Out in Philippine Market
Techworld Date Posted: 10:46 AM | 31 Views
Because we listen to our fans, the new Nokia 6 is made even better to become more than just a smartphone that processes, clicks and communicates, but rather a companion you can trust, depend...See More

 
Wi-Fi in the Office — Convenient but Risky
Techworld Date Posted: 3 July 2019 8:50 AM | 35 Views
Wi-Fi in the Office — Convenient but Risky. See More
 
Wi-Fi in the Office — Convenient but Risky
Techworld Date Posted: 8:50 AM | 35 Views
Wi-Fi in the Office — Convenient but RiskySee More

 
Get First Dibs to Early Christmas Treats with Lazada’s Online Revolution Sale
Techworld Date Posted: 2 November 2017 3:19 PM | 630 Views
It is the happiest time of the year again. Christmas starts early in the Philippines, and Lenovo and Motorola join Filipinos young and old in welcoming Christmas season 2017 with an early Christmas treat.... See More
 
Get First Dibs to Early Christmas Treats with Lazada’s Online Revolution Sale
Techworld Date Posted: 3:19 PM | 630 Views
It is the happiest time of the year again. Christmas starts early in the Philippines, and Lenovo and Motorola join Filipinos young and old in welcoming Christmas season 2017 with an early Christmas treat...See More

 
World-Renowned Photo-Editing App Publisher Launches ArtBot
Techworld Date Posted: 19 December 2017 8:59 AM | 407 Views
Meitu Inc., publisher of the world renowned photo-editing app Meitu, is dedicated to the pursuit of beauty around the world.. See More
 
World-Renowned Photo-Editing App Publisher Launches ArtBot
Techworld Date Posted: 8:59 AM | 407 Views
Meitu Inc., publisher of the world renowned photo-editing app Meitu, is dedicated to the pursuit of beauty around the world.See More

 
DJI Introduces Mavic 2 Pro and Mavic 2 Zoom: A New Era for Camera Drones
Techworld Date Posted: 21 September 2018 9:10 AM | 20 Views
DJI, the world’s leader in civilian drones and aerial imaging technology, has introduced a new era for camera drones with two additions to its iconic Mavic series: Mavic 2 Pro, the world’s first drone.... See More
 
DJI Introduces Mavic 2 Pro and Mavic 2 Zoom: A New Era for Camera Drones
Techworld Date Posted: 9:10 AM | 20 Views
DJI, the world’s leader in civilian drones and aerial imaging technology, has introduced a new era for camera drones with two additions to its iconic Mavic series: Mavic 2 Pro, the world’s first drone...See More

 
Kaspersky Lab’s Statement on NotPetya Ransomware Attacks Reported 27 June
Techworld Date Posted: 4 July 2017 2:50 PM | 370 Views
Kaspersky Lab’s analysts are investigating the new wave of ransomware attacks targeting organizations across the world. Our preliminary findings suggest that it is not a variant of Petya ransomware as publically reported, but a.... See More
 
Kaspersky Lab’s Statement on NotPetya Ransomware Attacks Reported 27 June
Techworld Date Posted: 2:50 PM | 370 Views
Kaspersky Lab’s analysts are investigating the new wave of ransomware attacks targeting organizations across the world. Our preliminary findings suggest that it is not a variant of Petya ransomware as publically reported, but a...See More

 
ZOWIE eXTREMESLAND Qualifiers Is Now Open
Techworld Date Posted: 26 July 2018 1:41 PM | 591 Views
BenQ Philippines in Partnership with ArkAngel Internet Café and WASD Philippines is proud to bring the Extremesland Official Philippine Qualifiers.. See More
 
ZOWIE eXTREMESLAND Qualifiers Is Now Open
Techworld Date Posted: 1:41 PM | 591 Views
BenQ Philippines in Partnership with ArkAngel Internet Café and WASD Philippines is proud to bring the Extremesland Official Philippine Qualifiers.See More

 
Vulnerabilities in Connected Electric Car Chargers Could Damage Home Networks
Techworld Date Posted: 23 January 2019 5:07 PM | 26 Views
While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such as the battery chargers, often remain neglected.. See More
 
Vulnerabilities in Connected Electric Car Chargers Could Damage Home Networks
Techworld Date Posted: 5:07 PM | 26 Views
While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such as the battery chargers, often remain neglected.See More

 
Kaspersky Lab Bags Two Wins At Networks Asia Information Management Awards 2018
Techworld Date Posted: 11 June 2018 4:19 PM | 548 Views
(From left) Jesmond Chang, Head of Corporate Communications for Kaspersky Lab APAC, receives the award from Nikolay Novozhilov, Head of Digital Products at NTUC Link   Kaspersky Lab announced its win of two cybersecurity.... See More
 
Kaspersky Lab Bags Two Wins At Networks Asia Information Management Awards 2018
Techworld Date Posted: 4:19 PM | 548 Views
(From left) Jesmond Chang, Head of Corporate Communications for Kaspersky Lab APAC, receives the award from Nikolay Novozhilov, Head of Digital Products at NTUC Link   Kaspersky Lab announced its win of two cybersecurity...See More

Rafael Aquino
Some History on Ubisoft
Techworld • By: Rafael Aquino | Date Posted: 18 April 2017 11:10 AM | 29 Views
Headquartered in Rennes, France, Ubisoft Entertainment SA, has suffered ups and downs. See More
Rafael Aquino
Some History on Ubisoft
Techworld • By: Rafael Aquino | Date Posted: 11:10 AM | 29 Views
Headquartered in Rennes, France, Ubisoft Entertainment SA, has suffered ups and downsSee More


Power by

Download Free AZ | Free Wordpress Themes