Cybersecurity Opinion South Africa

Subscribe to industry newsletters

Search jobs

Five security resolutions to keep this year

Resolutions. Everyone makes them but not everyone sticks to them. But when it comes to IT security, organisations cannot afford to be complacent. Here are some changes that are truly worth making this year.
cherylholt via
cherylholt via pixabay

• Resolution 1: Lose some weight (seriously, I mean it this time)

2016 will finally be the year that we start reducing our security footprint - not by loosening security, but through consolidation. The first priority will be slimming down firewalls by consolidating our distributed defences onto core networking devices to make security easier to manage, control and troubleshoot.

• Resolution 2: Read more

Not books, although those are good too, but in 2016, we're going to inspect more outbound SSL traffic. Today's security tools typically monitor incoming traffic for malware, but the zero-trust/SSL everywhere model leaves a blind spot for inspecting outbound flow. The need to 'break and inspect' outbound traffic will be crucial in securing the network in the year ahead.

• Resolution 3: Make new friends

We've already seen the beginnings of this resolution, but in 2016 there will be an uptrend of traditional security vendors partnering with networking companies and cloud providers. In the age of hybrid data centres and mobile workplace environments, enterprises can no longer depend on traditional network firewalls to keep their data safe and vendors with areas of expertise will need to bridge the gap to create a more comprehensive security solution. The perimeter is disappearing and vendors are teaming up to secure enterprise networks at the application level.

• Resolution 4: Try new things

The next wave of cyberattacks have evolved and attackers are moving to a more targeted approach - with some attackers even coding to bypass specific security firms' capabilities. This results in malware mutating at a rate that is difficult for both the enterprise and security firms to keep up with. In 2016, we'll look for new vectors to help enterprise partners keep up with fast-moving, constantly evolving threats, making behavioural analytics a new priority to ensure your data and apps are doing what they're meant to do.

• Resolution 5: Secure the IoT

As more devices and applications join the IoT ecosystem, the likelihood of vulnerabilities facing data centres increases exponentially. In 2016, the industry focus will shift from concerns over IoT devices being turned into a bot army, to a conversation about keeping IoT traffic secured, and out of sensitive areas.

Security teams will start establishing baselines for web application security to measure against it and monitoring systems, which will also help ensure the bot army doesn't become self-aware just yet.

About Martin Walshaw

Martin Walshaw is a senior engineer at F5 Networks and has multiple accreditation from being a CCIE to being a CISSP to being an F5 Certified Professional. His background is in security, but he has also has skills in multiple different areas including unified communications, application acceleration and optimisation.

Let's do Biz