Enterprise security will always be a top priority and as attackers grow in their sophistication, so too does an organisations’ security strategy to protect and secure operations, information and people.
The digital revolution, and the technologies underpinning it, are continuing to transform the world in which we live. This allows new companies and industries to emerge, and creates opportunities for existing organisations to deliver enormously enhanced products and services.
Consequently, security across public and private organisations has intrinsically evolved. And with legal responsibility for security now residing in the C-Suite, a tick-box approach will not suffice.
Company executives, business technology leaders, CIOs and Chief Information Security Officers (CISOs) face complex challenges in optimising their information security programmes. And many security professionals are combating malicious attacks daily, keeping their organisations and customers secure, often unheralded.
As a result, as security requirements continue to grow, progressive organisations are increasingly looking to security outsourcing, managed security services and security automation technologies for help.
The cyber threat landscape has changed rapidly over the last few years. Global retail, energy, telecoms and financial brands - among others - are increasingly aware of the growing cybercrime threats and are taking greater steps to protect themselves.
Cybercriminals are continuing to use traditional methods: attacking network nodes through DDos; exploiting application weaknesses; and using phishing and spam emails.
However, new sources of vulnerability are emerging, including attacks on IoT devices; infected point of sale software; and compromised cloud applications and end-user devices. These new routes of attack create new challenges for enterprise resilience.
And thinking about mobile, there’s a proliferation of devices in use, driven in part by a larger number of Millennials in the workforce than previously. They favour mobile working and like to use personal and business apps on the same smart phone or tablet. Whilst they are working in innovative ways, it also means that mobile security is paramount for organisations that want to support their wire-free workers.
Rob Hale, Head of IT & Cyber Security, O2 Telefónica UK, comments, “Mobile communication, by its very nature, is risky not only through potentially sharing information with the wrong people, but also because, as the need for ubiquitous connectivity increases as demand from employees to remotely access corporate data grows, so do the risks and potential new avenues of attack.”
He adds, “The information that can be accessed via a mobile device means it’s now more important than ever to make sure they’re secure from theft, damage and also from being hacked.”
Managed security services and security automation can be part of the solution to the current security challenges. For example, O2 offers dynamic security services in this field to protect traditional networks, as well as modern cloud, mobile and BYOD environments. O2’s services include Secure Mobility, ensuring you have the right security policies and support with encryption, authentication and mobile device management (MDM).
Another service is Secure Mobile from O2, which uses Check Point's Mobile Threat Protection to give mobile devices enterprise-level cyber security protection. It features the very latest firewall, intrusion prevention and malware protection for Wi-Fi, 3G and 4G.
O2 also offers infrastructure security, to make sure your infrastructure is aligned and configured to meet expectations for risk mitigation, protecting against new and emerging threats.
In addition, there are services to combat cyber security threats like online fraud, intellectual property theft, and attacks against the organisation’s reputation.
Hale says, “In an increasingly mobile-centric world, new attacks continue to target mobile devices, with recent malware and exploits being seen in the wild against both unprotected Apple and Android devices.” Using an app store to look for known bad apps or malware with signatures is a starting point but you need to do more to effectively secure data and devices. Cyber crime constantly evolves as does security so it’s important to stay current and relevant with the solutions you choose.
Hale continues, “We need to look at how the apps we install on our devices behave. Detecting side-loaded apps and malware is also critically important. By monitoring the behaviour, we can detect both known and unknown security threats in real time and deal with them before any damage can be done. O2 Secure Mobile can complement MDM and there are a host of security options available to support your in-house expertise.”
In developing services like these, O2 has been strengthening its cyber security expertise over the last two decades, and recently became the UK’s first intelligence-backed cyber security organisation.
Working with GCHQ, Wayra UK, part of Telefónica Open Future, was chosen to run a new cyber accelerator facility with the aim of helping UK start-ups grow and take the lead in producing the next generation of cyber security systems. The tie-up is the first step in the development of two world-leading innovation centres as part of the Government’s £1.9bn National Cyber Security Programme.
Whilst the sorts of security services that O2 is developing are becoming more highly valuable, so is the role of the CIO/CISO when it comes to securing the business.
Enterprises using these services still need good leadership, and skilled in-house staff to manage services and implement security best practices within the organisation.
But even if you’re not an expert, an experienced service provider like O2 can help. At the end of the day, security is, and always has been, a shared responsibility, so perhaps it’s time to partner up.
Find out more about O2’s security solutions here
This article is bought to you in association with O2