The Times Australia
Fisher and Paykel Appliances
The Times Technology News

.

Spotlight On Devices This Cyber Security Awareness Month: Businesses Need Complete Attack Surface Visibility To Protect Assets

  • Written by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis

The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats.

They have outlined four simple steps for all Australians to improve their cyber security – turn on multi-factor authentication; keep devices and software up to date; use strong and unique passwords and recognise and report phishing.

The spotlight on individual responsibility is encouraging and helps to address the expanding attack surface created by the ever-increasing number of devices, which in turn introduces a multitude of potential vulnerabilities. In fact, research from Armis revealed that tablets, media players, personal computers and mobile phones were among the top 10 device types with the highest number of attack attempts.

Expanding attack surface

While adopting MFA and strengthening passwords are non-negotiable in today’s threat environment, ongoing security updates and patching discovered weaknesses are equally vital. Consumers must also be educated on the threats posed by their devices through lax security protocols, standardised product class passwords and insecure use. Each unsecured device adds another layer to the expanding attack surface.

Businesses too are under threat, as devices move between personal and corporate environments, potentially encountering unsecure networks. As the proliferation of connected devices continues, it becomes imperative for organisations to monitor and manage them. They are increasingly inundated with a growing mass of devices connecting to their business-critical data and infrastructure. Nearly every business now relies on these devices for many processes through managed devices. As a result, organisations end up not knowing what or how many assets they have.

The cornerstone of effective cybersecurity for businesses is visibility

To achieve true resilience against ever-evolving cyber threats, a proactive approach is needed. This includes comprehensive identification and real-time monitoring of all connected devices, along with the ability to identify and swiftly mitigate vulnerabilities across the entire attack surface.

Just like you can’t fix a problem you don’t know exists, you can’t protect assets you can’t see. The first step is achieving complete attack surface visibility. This means identifying all connected devices, including known and unknown physical and virtual assets, that are connected to the network.

While eliminating all risks is impossible, prioritisation and continuous monitoring are crucial. By investing in real-time asset intelligence, vulnerability analysis, AI-powered threat detection and remediation, organisations can proactively mitigate and manage their cyber risk exposure.

Furthermore, organisations must keep cyber exposure front of mind. This means using AI-powered platforms to help see, protect and manage all their assets in real time against potential threats.

Doing so ensures they can proactively mitigate risks, remediate vulnerabilities, block threats and protect their entire attack surface.

Active Wear

Times Magazine

End-of-Life Planning: Why Talking About Death With Family Makes Funeral Planning Easier

I spend a lot of time talking about death. Not in a morbid, gloomy way—but in the same way we d...

YepAI Joins Victoria's AI Trade Mission to Singapore for Big Data & AI World Asia 2025

YepAI, a Melbourne-based leader in enterprise artificial intelligence solutions, announced today...

Building a Strong Online Presence with Katoomba Web Design

Katoomba web design is more than just creating a website that looks good—it’s about building an onli...

September Sunset Polo

International Polo Tour To Bridge Historic Sport, Life-Changing Philanthropy, and Breath-Taking Beau...

5 Ways Microsoft Fabric Simplifies Your Data Analytics Workflow

In today's data-driven world, businesses are constantly seeking ways to streamline their data anal...

7 Questions to Ask Before You Sign IT Support Companies in Sydney

Choosing an IT partner can feel like buying an insurance policy you hope you never need. The right c...

The Times Features

Magnesium Pools in Australia: A Smart Choice for Style, Comfort, and Wellness

When it comes to creating the perfect backyard oasis, Australians are spoilt for choice. From tr...

Meet Ella’s Elbow: The citrus squeezer and shot measurer redefining form and function

We recently got our hands on the new Ella’s Elbow, a patented citrus squeezer that’s made to feel as...

End-of-Life Planning: Why Talking About Death With Family Makes Funeral Planning Easier

I spend a lot of time talking about death. Not in a morbid, gloomy way—but in the same way we d...

Temu explained: How it really works

What Temu is doing to small retailers worldwide Temu has blitzed its way into shopping feeds fr...

Is Laminate a Good Option For Kitchen Benchtops?

When it comes to renovating your kitchen, one of the most important choices you’ll make is your be...

Albanese Government failing to defend the rights of ex-service personnel

The Albanese Government is failing to defend the rights of ex-service personnel to seek a review of ...

Increase your holdings and hold your increases from a wisely diverse investment portfolio.

What comes to your mind when I ask about which investments are most important to you? I imagine we w...

Canberra Just Got a Glow Up: Inside Kingpin’s Dazzling New Attractions

Canberra’s entertainment scene just levelled up. Kingpin entertainment, Australia’s home of immers...

The Capsule CEO: Ashley Raso’s Reinvention from Property Developer to Fashion Founder

From property developer to creative founder, Raso positions Capsule WD as the wardrobe system resh...