top of page

Cyber security

Managing cyber security activities.

The scale of cyber-attacks and the resulting media attention, pressures to modernize cyber-risk management and the pace of technology innovation that needs to be kept pace is growing rapidly. These factors clearly demonstrate to organizations that they need to understand the computer risks they face and determine the level of cyber risk that the institution is willing to accept.

The cost of organizations to eliminate cyber threats is estimated at $ 0.5 billion a year. The main reason why they can threaten the organization to such an overwhelming extent is that today's cyber security systems typically only use centralized monitoring that only protects the organization from their main communications gates and firewalls, but the rest of the infrastructure behind them is no longer monitored. As a result, when companies are attacked, it may take days for ICT teams to isolate infected systems, remove malicious code and restore business continuity. While identifying, evaluating, and resolving an incident, malicious code is usually expanding almost unrestrictedly to any connected or even indirectly related system, giving hackers even more time to access sensitive data and cause malfunctions.

To identify and eliminate new cyber attack scenarios, security systems must look for individual anomalies, analyze the likelihood of a hostile act and integrate them into an ever-expanding list of possible threats.

PATRIK KOVACS, PARTNER

In order for companies to resist new electronic attack techniques, companies must implement a decentralized cyber security architecture equipped with intelligent mechanisms that either automatically disconnect from the infected system or automatically switch to a "safe mode" that allows them to operate at a lower level the consequences of a cyber attack can be eliminated or repaired. Just like general security systems at high-risk sites such as nuclear power plants, organizations have to implement multi-layer security mechanisms and cybernetic control systems. The aim should be to create "air pockets" that do not have a direct or indirect connection to the Internet, which can then protect critical devices and internet connected devices. Everyone's cyber security program should have unique attributes, but there are a few basic recommendations of this decentralized architecture that can help companies change the balance of power from attackers to defenders.

Even the best professionally designed computer architecture is useless if it fails to recognize and understand the threats it faces. Companies will experience other cyber viral epidemics because they are often unable to detect or detect them when it is too late. Today's cyber-security systems are built to detect previously identified malicious codes and malware. Computer attacks, however, change and evolve so quickly that some threats are unpredictable.

bottom of page