Indeed published expectations of e-security for the 2019

The gate Arab News Technical The Gate Arab News Technical

سيتركس تنشر توقعات الأمن الإلكتروني لعام 2019

With the approaching end of 2018, it’s time to move to new ways of working in 2019, it was revealed 1.7 million attacks for ransom globally in 2018, was among the 2.4 million attacks in the United Arab Emirates, followed by Kuwait and Bahrain with 1.9 million and 1.2 million respectively, where you will face the attackers and their attacks in the area using more sophisticated techniques than ever before, without any slowdown in the next year, she explained the sword fulfilled the chairs, Regional director of engineering and sales in Europe, Middle East and Africa and the emerging markets Company company Citrix, highlighted its outlook on the Cyber Security Act of 2019, which organizations need in the region to follow:

  • Will cybercriminals over the next year to re-organize their ranks and develop their attacks more, we have already seen the concentration of these sectors and institutions specific, so will cybercriminals briefing to an organization or a particular industry under pressure, ranges this pressure between the sharing of Infrastructure, Information Technology and even financial problems are widespread.
  • Will be the internal control and monitoring of standard procedures in case of an emergency next year, you guys increased your surveillance monitor you, the more likely you discovered any problem in its early stages.
  • Demonstrated cyber-attacks previous to the supply chain can be the weakest link for a large number of institutions, so you should plan to follow the violence of security in purchases when you join a new provider.
  • We will proceed through 2019, driving more companies to highlight its efforts in the area of compliance with laws for marketing purposes, where you will feel the issue of compliance with the then priorities of the company that will exceed even the concept of dialogue.

#1 – the Department of assessment to effectively continue to comply with the laws and legislation

Is considered to comply with the laws and legislation of the difficult work undertaken by the company which is entitled to be proud of in the achievements about, and we will be through 2019, driving more companies to highlight its efforts in the area of compliance with laws for marketing purposes, where the question of compliance with the then priorities of the company that will exceed even the concept of dialogue.

Some institutions in order to continue to comply with the laws to impose restrictions, strict internal information companies, in terms of staff, partners and suppliers, however, this type of evaluation requires planning and management to avoid obstacles to business operations effective, they also take advantage of the re-design of any business process, to ensure that the border in the proper place for issues of compliance and risk management.

#2 – in case of emergency, you should avoid addressing the safety assembly

Companies focus more on emergency planning, with the threat of European Union Fines at all institutions in accordance with the laws of the general regulation of data protection, where no one at all to blame for cyber-attack linked to, but that doesn’t mean to focus on the specific threats facing your company, so don’t to focus on what you are talking about externally, even the threats that bear the name of the attractive and luxurious, but must continue to manage important issues, the investment of security resources accordingly, and if you have a flexible plan, contingency is available, and if you have tested in advance.

#3 – watch out for attacks when confronted with company problems and pressures

Says cybercriminals over the next year to re-organize their ranks and develop their attacks more, we have already seen the concentration of these sectors and institutions specific, so will cybercriminals briefing to an organization or a particular industry under pressure, ranges this pressure between the sharing of Infrastructure, Information Technology and even financial problems are widespread, which will be used by attackers as an opportunity to launch attacks clear to distract the IT team busy, there will be an attack more stealthily in the meantime going to steal real assets, so whether you’re a public-sector institutions that suffer from the funding cuts of the latter, Or retailer giant has plenty in the customer data stored on their systems are old and abandoned, the cybercriminals will to inflict the greatest possible damage to your company, so whatever the pressure was that appointed by your company, don’t neglect to monitor your assets and protect the basic.

#4 – recognition of the need for the company’s internal control

Will be the internal control and monitoring of standard procedures in case of an emergency next year, you guys increased your surveillance monitor you, the more likely you discovered any problem in its early stages, only to institutions placed under the problem that they are trying to solve and a question: Will the internal control this problem? For example, is a source of concern to your main post on the virus deployed in your Network? You can then determine what data you need to monitor them, and how to apply security analytics to shed light on the problems, and then how the interaction of officials with it, nor gather the data that will not work, because it’s a waste of your resources, and data are big does not mean all data.

#5 – the amount of power your company is linked to the weakest link in

Demonstrated cyber-attacks previous to the supply chain can be the weakest link for a large number of institutions, so you should plan to follow the violence of security in purchases when you join a new provider, this is not just a sport, it Risk Management, Security activity, here are the highlights of the next question, Did the company refuse any vendor based on the results of the audit?, the As it is in case you didn’t realize the security risks of suppliers, the cybercriminals will use your suppliers as a springboard to reach their ultimate goal, namely, your company.

The gate Arab News Technical company publishes the forecast Cybersecurity Act of 2019

If you are watching what you read now, be aware that this content a user is illegally in this location, and the original position of the gate Arab News Technical

Leave a Reply

Your email address will not be published. Required fields are marked *