Interviews

Unmasking the Impact: How Covid-19 Transformed Network, Cloud, and User Security

CXOToday has engaged in an exclusive interview with Ashok Prabhu, Chief Sales Executive at Value Point Systems, a Noventiq company.

 

  1. How did the Covid-19 situation affect network security, cloud security, and user-level security?

The pandemic radically changed the way operations were traditionally carried out. Movement was largely restricted, and the challenge was to carry on professional obligations from the confines of the home. This, combined with factors like enhanced technical sophistication, greater smartphone penetration and the emergence of 5G, has led to greater digitisation. Everything is now online, and growth is primarily data-dependent. Naturally, this means that cyberspaces are growing, and with it, the scope of attack and breach is also increasing. Therefore, we need to strengthen our cybersecurity infrastructure and widen its application.

2.How has Covid modified the cybersecurity landscape? Has excessive smartphone use created new difficulties?

As mentioned, Covid spurred the need for cyber protection globally. The excessive use of smartphones, especially to access professional or confidential information, has further enhanced this. One primary concern with increased smartphone usage is that users usually do not pay much attention to protection and building resilience to attacks on these devices. This compromises wider networks and leaves them vulnerable to attacks. These include ransomware incidents, phishing scams, and network spoofing.

3.Many are still unaware of the need to protect their smartphones. With mobile phones, there are also fewer products available that offer cybersecurity solutions than there are for computers. Why so?

It’s important to remember that cybercriminals are now targeting mobile devices due to the lax security measures taken by users. For example, many apps save passwords, and lighter versions of these mobile applications have fragile algorithms for security. Mobile phones contain abundant data related to professional operations and personal transactions. Any breach can create larger security concerns. This, coupled with the tendency of users to log in to unsafe Wifi networks, makes the system extremely vulnerable.  Reason for fewer products to secure smartphones has been due to lesser awareness of the impact of the cyber security breaches as mostly phones have been considered only as voice device but today, it is no less than a laptop. Typical endpoint security covered only laptops and desktops so far, even the security companies did not predict the smartphone proliferation to this extent in terms of its usage. If you ask me today, this has become one of the key initiatives at corporates to ensure that if the employee owned smartphones are used for corporate usage, they will ensure cyber security technology deployment to ensure security and management of the device and the information.  

4.What practices should be used to prevent data breaches?

One simple and effective practice is to install quality and reliable cybersecurity software. These need to be regularly updated and kept in tune with the latest trends. Certain precautions also need to be taken. Apart from basic hygiene security measures like passcode to access the phone,  regular updates of the OS and Apps, avoiding the financial transactions on Open WiFi, keeping your backup securely on cloud, ensuring the apps are downloaded from the trusted source, ensuring private information is not revealed over a call or by clicking the SMS links , it is highly recommended to use the mobile security application available across many security vendors for device security and urge their organization to ensure the deployment of MDM solutions to ensure corporate information is not mixed with their personal information. Hence, there are two obligations of using the smartphone today i.e one to secure self from getting breached, second if you are using the personal phone for corporate use, ensure that comes with the deployment of MDM/ MAM / MCM to ensure security of the company’s confidential information too.

5.What are the takeaways and the next steps?

Each individual today needs to think of Cyber Security when using the smartphone. There should be sense of accountability to ensure neither personal nor corporate information is compromised due to ignorance.  It is no longer that phone was used only for voice. Today’s smartphones are a lifeline for doing our day to day activities. First, it is important to ensure think of Mobile Device Security. Second, if you are using the phone for corporate use, it is crucial to make sure that your organization installs mobile application management and mobile content management. Basically, it is essential to secure the device on which you spend most part of the day.

Leave a Response