Complete data privacy is becoming more and more accepted as a myth. IT leaders are realising that there is no such thing as completely watertight IT security, and the traditional ‘fortress’ mentality is beginning to come loose. Traditionally the widespread notion has been that data is either fully secure or in full breach.
The more realistic approach is to prepare for cyber attack more diligently. In order to remain competitive organisations have to embrace the Cloud and accept that data will reside in potentially, multiple locations in the future. This will become especially apparent as data volume grows exponentially, over the coming years.
In order to cope with increased data sizes predictions suggest that the overall security approach must be far more automated. The speed and scale of attacks mean that organisations can no longer rely on human identification of intrusion and threats. Solutions must now be put in place which can detect, access and respond to external threats immediately.
A detected threat may lead to the shutting down of one portion of the network as well as the instigation of proactive monitoring. If the threat is escalated to high priority, further portions of the network may subsequently be shut down.
There is also now a more clear idea emerging over what exactly a data leak means for a given organisation. A leak for example, regarding a major retailors transportation routes will not necessarily lead to a competitor gaining the ability to replicate the retailors supply chain.
The bottom line is that automation will become a large part of the overall security strategy, for every IT organisation.
Another future strategy for extreme cyber attacks is the prospect of ‘fighting back,’ rather than remaining defensive. Such efforts include that of Sypris who are creating a ‘cyber range.’ It is hoped that the range will be a battle ground within cyber space which will allow agencies to test their offensive and defensive strategies. .