As the economy moves online, businesses are become more vulnerable to cyberattacks. The list of casualties grows every day, with big names falling victim to cyber breaches. The attacks are becoming more sophisticated and harder to trace, and they’re becoming more frequent.
Cybersecurity is a critical requirement for combatting trends such as nation-state backed espionage, more vulnerable service providers, big data, mobile apps, and encryption failures. The protection of corporate Intellectual Property (IP) is becoming an increasing concern for IT organizations as confidential information is housed in digital format. Threats from both inside and outside the company must be considered.
During the Digital Revolution, organizations need to assume that they are under attack every day and that the bad guys are already on their network. Ultimately, organizations need to build a moat around their most important systems.
No real risk can be mitigated to a zero percent likelihood of occurring, and some risks are 100 percent likely to happen. So how can the digital enterprise determine which risks to mitigate and what consequences to prepare for?
According to research, the average organization needs to keep one percent of its information and 69 percent of enterprise information can be thrown out without suffering negative consequences. Keeping everything means higher storage and infrastructure costs. In instances of litigation, the cost of investigation increases as content is searched, examined, and reviewed across many sources. With today’s dramatic growth in content volume, this approach is not tenable.
Not all information is created equally and not all information exposes an organization to the same risk. EIM permits secure access to information on a “need to know” basis, while preserving an archive of information.
The more data an organization stores and manages, the greater the risks for security breaches and non-compliance. To protect enterprise information, organizations need to practice the fundamentals really well. Most companies forget that security is all about “back to basics”:
- Employees need education. Fifty percent of all cyber security issues are caused by a lack of education and “naive” employee actions.
- The next 25 percent comes from hardware or software assets that are not up to date. Are they running an outdated email client, for example, that has known vulnerabilities?
- Is the perimeter defined and protected, or were the gates left open? The response time on shutting the gates is critically important.
These basics will make organizations 95 percent secure. Along with investment in an Enterprise Information Management (EIM) platform.
OpenText Release 16 – Defense in Depth
EIM is designed to protect information where it is used: at the point of interaction in the application itself, offering security mechanisms such as access and permissions, information audit capabilities, and secure information exchange built right into the system. In OpenText™ Release 16, our latest EIM platform, we’ve taken security up a notch. User- and role-based security happens at the application level. To help ensure privacy, enhanced access and identity management are available through active directory and upgrades to directory services. Both data at rest and data in transit are protected. We guarantee network security, operational security based on our state-of-the-art data centers, and many standards for compliance.
Enterprise Content Management (ECM) addresses governance and compliance in OpenText Release 16—but it’s much more than this. It is ECM re-imagined. Read all about it in my next blog.
Find out more: www.opentext.com/16