Maintaining Cyber Security Through an Immune System Approach

 


Data breaches occur in global giants and also many incidents in the world, this is certainly an important note in developing national awareness of the importance of developing cyber security that is integrated with all operations, even some leaks occurred during the COVID-19 pandemic, the financial impact of Cyber attacks has never decreased .
In line with the high level of use of information and communication technology, the level of risk and threat of misuse of information and communication technology is also getting higher and more complex, it is necessary to complete and identify all processes related to cyber security.



In addition, proper Risk Management needs to be applied with discipline, especially if an incident has occurred, a proper strategy is required to take legal action and disclose information with external parties to maintain good reputation.



Furthermore, periodic evaluations need to be done, the actions that should be taken to reduce all potential threats from the outside and from the inside need to be observed, having criteria for various layers of defense, both from human resources, processes, and technology itself, both in the application as well as the infrastructure, which allows it to survive effectively, anticipate the impact of data protection that can be disrupted due to leaks, so that measurable SOPs (System Operations and Procedures) are needed, preventing cyber attacks from affecting the system.



Cyber security threats include phishing, spear phishing, Trojans, malware, ransomwares, DDoS, IOT Devices attacks, MoMA (Malware on Mobile Apps), and the most worrying is the presence of advanced persistent threats.



However, what is also very important in cyber security, can be intentional and not necessarily anticipated by the cyber security team in general, which is theft attacks and data leaks originating from within and or intentional by internal parties.



This of course cannot be easily prevented by cyber security tools, because the internal parties concerned have the authority and access to do so, not to mention the possibility of sharing passwords which in principle cannot be done.



The above will certainly cause expensive important losses, loss of public trust such as the dissemination of customer data by irresponsible people, personal data being traded, etc.



Mitigation from within



There are 4 main factors that can be considered to do, including:



Know all the data that comes out from within through various media such as email, chat, social media, external storage, etc

Find out what will happen to the organization from the internal elements through the employee monitoring application

Prevents the deletion and editing of documents by insiders

Prevent the installation of malicious applications

The things we should pay attention to are:



Internal elements are very dangerous and undetectable,

Humans can turn into rebels, integrated security between external security and internal security is essential to prevent the occurrence of internal elements,

Important data and documents that are not managed or centralized are highly vulnerable to being used by unscrupulous people.

We must continue to be optimistic, that in fact the development of AI technology with an immune approach can be done in the current implementation of cyber security, including controlling all particles of files and databases in the network spread across endpoint users, and controlling all network accessories in endpoint users silently. silent remotely, anywhere and anytime so that our security can be fully controlled, wherever we are integrated.



Are we ready to protect our reputation? Yes, of course you must be prepared. The world is in your hands! And there must be a solution.
Previous Post Next Post

Contact Form