Google AI
The Times Australia
The Times Technology News

.

Spotlight On Devices This Cyber Security Awareness Month: Businesses Need Complete Attack Surface Visibility To Protect Assets

  • Written by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis

The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats.

They have outlined four simple steps for all Australians to improve their cyber security – turn on multi-factor authentication; keep devices and software up to date; use strong and unique passwords and recognise and report phishing.

The spotlight on individual responsibility is encouraging and helps to address the expanding attack surface created by the ever-increasing number of devices, which in turn introduces a multitude of potential vulnerabilities. In fact, research from Armis revealed that tablets, media players, personal computers and mobile phones were among the top 10 device types with the highest number of attack attempts.

Expanding attack surface

While adopting MFA and strengthening passwords are non-negotiable in today’s threat environment, ongoing security updates and patching discovered weaknesses are equally vital. Consumers must also be educated on the threats posed by their devices through lax security protocols, standardised product class passwords and insecure use. Each unsecured device adds another layer to the expanding attack surface.

Businesses too are under threat, as devices move between personal and corporate environments, potentially encountering unsecure networks. As the proliferation of connected devices continues, it becomes imperative for organisations to monitor and manage them. They are increasingly inundated with a growing mass of devices connecting to their business-critical data and infrastructure. Nearly every business now relies on these devices for many processes through managed devices. As a result, organisations end up not knowing what or how many assets they have.

The cornerstone of effective cybersecurity for businesses is visibility

To achieve true resilience against ever-evolving cyber threats, a proactive approach is needed. This includes comprehensive identification and real-time monitoring of all connected devices, along with the ability to identify and swiftly mitigate vulnerabilities across the entire attack surface.

Just like you can’t fix a problem you don’t know exists, you can’t protect assets you can’t see. The first step is achieving complete attack surface visibility. This means identifying all connected devices, including known and unknown physical and virtual assets, that are connected to the network.

While eliminating all risks is impossible, prioritisation and continuous monitoring are crucial. By investing in real-time asset intelligence, vulnerability analysis, AI-powered threat detection and remediation, organisations can proactively mitigate and manage their cyber risk exposure.

Furthermore, organisations must keep cyber exposure front of mind. This means using AI-powered platforms to help see, protect and manage all their assets in real time against potential threats.

Doing so ensures they can proactively mitigate risks, remediate vulnerabilities, block threats and protect their entire attack surface.

Times Magazine

Why Is Professional Porsche Servicing Important for Performance and Longevity?

Owning a Porsche is a symbol of precision engineering, luxury, and high performance. To maintain t...

6 ways your smartwatch is lying to you, according to science

You check your smartwatch after a run. Your fitness score has dropped. You’ve burnt hardly any...

Has the adoption of electric vehicles led to new forms of electricity theft

Why the concern exists Electric vehicles (EVs) like the Tesla Model 3 or Nissan Leaf shift “fue...

Adobe Ushers in a New Era of Creativity with New Creative Agent and Generative AI Innovations in Adobe Firefly

Adobe (Nasdaq: ADBE) — the global technology leader that unleashes creativity, productivity and ...

CRO Tech Stack: A Technical Guide to Conversion Rate Optimization Tools

The fascinating thing is that the value of this website lies in the fact that creating a high-cali...

How Decentralised Applications Are Reshaping Enterprise Software in Australia

Australian businesses are experiencing a quiet revolution in how they manage data, execute agreeme...

The Times Features

Cost of living increases worry Farrer residents

COST OF LIVING ‘CRUNCH’ HITS FARRER HARD, THE NATIONALS HEAR During a visit to Albury this week...

What's On: Two Psychics and a Medium – Australian Tour…

HIT LIVE SHOW TWO PSYCHICS AND A MEDIUM EMBARK ON  AUSTRALIAN TOUR — AND NO TWO NIGHTS WILL BE T...

Before vaccines, diphtheria used to kill hundreds each …

The Northern Territory[1] and Western Australia[2] are experiencing outbreaks of an almost-era...

realestate.com.au attracts the buyer for 9 in 10 listed…

New PropTrack data reveals the impact realestate.com.au has on property sales, with the  platfor...

The Hidden Threat Inside Data Centers: Why Fuel Degrada…

Data centers are designed with one overriding objective: uninterrupted operation. To achieve this...

Holidays: How to Book a Flight — and Protect Your Money…

For decades, booking an overseas holiday was a straightforward transaction: choose your destinat...

Olivia Colman, Kate Box to join an exclusive Live Q…

Fresh out of cinemas, JIMPA - the new film by acclaimed director Sophie Hyde (Good Luck to you, ...

Homemade Food: Cheaper Than Takeaway, Healthier Than Yo…

As the cost of living continues to bite across Australia, households are taking a harder look at...

The Coalition wants NDIS reform to focus on 3 things. H…

The government is expected to announce further changes to the National Disability Insurance Sche...