![]() The fact that you have one place that detect the virus or the pandemic in one side of the enterprise, but on the other side of the enterprise, nobody knows what to do with it, is not helpful enough. “Companies need to take very seriously the need to build a unified cyber architecture,” Shwed warns, “to consolidate as much as possible. MORE FROM FORBES Why You Shouldn't Use The Gmail App On Your iPhone After New Privacy Disclosure By Zak Doffman All enabled by social engineering, our relative lack of security awareness when it comes to our phones, and no security software. The system should move, it should run by itself because the hackers are working 24/7.”Ĭheck Point’s 2021 security report warns that this mobile threat is now coming at us from every angle-banking trojans, mobile remote access trojans, deployed by both nation state threat actors and criminal enterprises, arms-length espionage by state intel agencies on overseas targets. Not see the attacks and do nothing or wait until next week, because it's now Friday evening and nobody's in. AI based autonomous threat prevention that will see the attacks and stop them. So, we need the tools to prevent them and stop them and these tools needs to be super-fast. “We need to understand that cyber attacks can behave like a pandemic and do behave like pandemic, except that they are much, much faster than a biological pandemic. “Looking at what we call a cyber pandemic is an important element,” he tells me. And that risk was catapulted by coronavirus.Īnd Shwed raises another parallel with Covid-19. The mobile threat vector has become much more critical in recent years. Maybe as few as 1% of cell phones carry security software, but 46% of companies found themselves infected by a malicious app brought into their ecosystem on an employee’s phone. Click here and use it.’ And that's very simple.”īack to those numbers. I access the company portal, it tells me: ‘If you want to keep using that, download this software from here. If you want to use your smartphone to access enterprise systems, then you need to be secure. There’s an urgent game of CISO catch-up to be played. How many of the smartphones accessing core enterprise systems don’t currently carry security software? “95% of them don't,” Shewd says, “or even 99% don't.” And this is his key takeaway. Today’s mobile security situation is a disaster. But rather saying your focus should be on the users.” ![]() So it's not going to be the decision of saying our focus is now on the PC, because that's what we know, or because that's the highest priority. What we are trying now to do with Harmony is actually address that by saying it's all going to be together. “On the PC side, that awareness level is quite high,” Shwed says. Gil Shwed warns of huge surge in malicious apps targeting Android and iPhone users. But with our phones, it’s all very different. A well-run organization wouldn’t enable its myriad employee laptops to access its core systems without any protection. Most of us know we should run software to protect our PCs and even our Macs. Unsurprisingly, the man who sells security software wants to sell more security software. Your cyber security strategies must also change.”Īnd this is Shwed’s theme as we speak now. “With the sudden shift to remote work,” the company said, promoting its event that included Chris Krebs amongst the speakers, “we learned the value of being able to adapt. Shwed is fresh from his company’s annual flagship CPX 360 event-held virtually this year. There is no doubt-we see that every day.” And the hackers are really taking advantage. Because we all realized how that creates a huge vulnerability in our infrastructure. “The security of the user wasn't the number one priority a year ago. Shwed sells security software-his latest innovation is Harmony, a multi-platform solution to safeguard a whole person, not just a few of that person’s specific machines. The hackers didn't lose sight of that and they are taking advantage of that.” ![]() “All our systems are now accessible by external entities-first and foremost, our employees, but then our suppliers, our vendors, they all do remote monitoring, remote work on our systems. Everything is mobile, remote, and we’re still not ready for that.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |