Hacker with black balaclava portrait

Cloud Security Urgency

As businesses increasingly move to Digital Economy, cyber security is no longer just an IT department issue but one that extends from the end user all the way to the boardroom. At the same time, breaches affecting global organisations continue on a regular basis. Vulnerabilities, malware and phishing attacks are growing exponentially in frequency and complexity as attackers focus on developing new ways to beat the system and monetise their efforts.

Cloud security therefore, has to be a key agenda item in every boardroom across the globe. Organisations can’t afford to wait for the inevitable attacks to happen to act. Right controls must be put in place right now to prevent, detect, and respond to cyber attack threats.

But cloud security is a fast-growing industry and the question remains, how does an organisation decide whom to entrust the security of their business with?

Jeremy Nyam

Jeremy Nyam

According to Fujitsu Security Solutions Mr. Jeremy Nyam, Head of Managed Services, the first thing to do is to look at the client list – any service provider that is well-established and deals heavily with government departments, security agencies and big businesses comes with a tacit seal of approval.

“Fujitsu Security Solutions is in the global top four of IT security service providers, as well as one of the largest. Besides working with government and security agencies, we provide cloud and on-premise security to help companies stay ahead of the growing threats, all with flexible deployment and commercial models, tailoring the services to individual requirements,” he said.

He further explained that some businesses make the mistake of plumping for just Internet service provider security, which isn’t enough. Local network security is a must, as well as a layer covering the cloud itself, to better prevent against distributed denial of service (DDoS) attacks that render websites inaccessible. Fujitsu Security Solutions provides end-to-end security solutions, from the terminal to the data centre to Internet of Things sensors.

What about security of outsourcing itself?
What are the risks and benefits of outsourcing information security management?

“Outsourcing is honestly the most efficient way forward. Working with a security solutions provider lets you tap into their experience and expertise. At Fujitsu we have over 350 security experts, state of the art Security Operations Centres and years of experience managing security for organisations with critical security needs, as well as a strong network of vendors”, he elaborates.

Building off this existing network – rather than approaching these partners individually – decreases complexity and protects the brand and revenue. Productivity gets a boost and cloud usage can be maximised. Vulnerability management, firewalls, and network access control can all be made safe without extra cost or headache.

“Why spend valuable time setting up security policies when the expenses of outsourcing can be written off as operating expenditure, thus allowing for money to be used elsewhere?” he adds, explaining that outsourcing allows businesses to significantly reduce IT admin tasks, reducing operational and maintenance issues and allowing people to focus on business-related tasks.

“Security is needed by all departments in any business or organisation – from Human Resources, to prevent data access leaks to Research & Design when it comes to protecting intellectual property. Cloud computing is entirely safe when information is protected by a company that is both supportive and reputable.”

What can we expect in the future?
As IoT grows, so will DDoS attacks. Data will still rule supreme, and web apps will be even more at risk for hacking. With all these threats, it is no wonder that most organisations seek expert help – especially with businesses increasingly digitising operations.

“Businesses have to be vigilant, and partner with the right people to combat these threats. Fujitsu Security Solutions offers ways for chief information and security officers handle risks and we provide the tools to help them do so: from web security, email security, training and awareness, data loss prevention, vulnerability management – we provide a holistic portfolio of services and products that prove to be game-changers when the question of cybersecurity management arises”, Nyam concludes.




There are no comments

Add yours