Has your cybersecurity been compromised?





We respect your privacy, and we hate spam as much as you. Which is why we will never share your email address with anyone.

Enquire Now

Rethinking the Approach to Embracing New Technologies

By Nicolai Solling, CTO, Help AG   |  Posted Thursday, 25th April 2019

New technologies are a beautiful thing. From innovations such as smartphones and other smart devices, to the less obvious ‘behind the scenes’ advancements such as AI and IoT, there is no debating that whether you’re technically inclined or not, technology influences and enhances your life. And while that gives embracing every new technological advancement a certain appeal, we must not forget that all these modern conveniences come with a security price.

The Digital Deluge

Arguably, in the last 20 years, there is probably no area that has had a greater impact on our professional and personal lives than IT- the Internet and the devices that we use to consume new technology. Moving forward, this will by no means change. Rather, I believe our dependency will only increase. Today, digital transformation is not just a business enabler, but also a key competitive parameter for almost any organization. Look at the local super market, which is increasingly getting its delivery orders through smart applications, or the way we book a table at a restaurant, or even a service for our car or a taxi to take us from point A to point B.

The Folly of Functionality Before Security

As digital transformation is imperative to business existence and relevance in the future, being able to secure the processes is extremely important. And it is exactly wherein the security challenges of embracing new technologies lie. In the race to innovate and deliver new and intuitive products and services for customers, businesses have focused on functionality and features, while assuming that security is a given. This however this is not the case.

The staggering number of zero-day vulnerabilities Help AG’s pen-testers find (exceeding 100 and constantly growing) is a good indication of the fact that technology is not flawless. How one deals with this is what sets organizations apart, and ultimately this will decide how securely they can enable new technologies. The fact is that every time you change your use of technology, you must put on your thinking cap to explore how this can be abused and then define your mitigation strategy.

Just think of how we use e-mail today– we access it from private devices such as smartphones and tablets and we are all aware of how much sensitive information is available in e-mails. So, the risk would be around data leakage on those devices. Your mitigating factors should be able to secure the content on the device, such as through containerizing the application and being able to delete the data in case the device is lost, or the user leaves the organization. Of course, this is just one short example.

Any organization should think about how technology can be used and abused. Having extensive experience and insight into how hackers think, Help AG is well aware of the various ways in which new solutions and services can be exploited. So, if you’ve got a new technology you’d like to leverage, don’t hesitate to contact us to discuss how it can be secured.

 

RELATED POSTS

IN THE HOT SEAT: A CHAT WITH TALAL

In this employee profile session, we sat down with Talal Wazani, our Manager, Strategic Security Consulting to learn about what motivated him into a career in cyber security,…

Read More

TOP MIDDLE EAST CYBER THREATS- 7 OCTOBER 2018

At Help AG, our Managed Security Services (MSS) team offers 24x7x365 monitoring of complex IT security infrastructures to some of the largest enterprises in the region. As a…

Read More

DEMYSTIFYING BITCOIN & WHY THE COST OF RANSOMWARE

As some of you may know, at least those who have been affected by a crypto malware, payment of the ransom is typically carried out in Bitcoin. Bitcoin…

Read More

Back to Top