search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Security


BACK TO BASICS


Quentyn Taylor, senior director – product, information security and global incident response at Canon EMEA looks at why cyber hygiene still matters in the age of AI and evolving threats.


I


t is now a matter of when, and not if, businesses will experience a cyber-attack. As the importance of IT data processing and volume


of confidential business data grows, IT leaders are under increasing pressure to safeguard business critical operations and protect their reputations. To address the constant threat of cybercrime, IT


decision makers (ITDMs) are having to focus more time on managing information security than ever before, with Canon research showing that as many as half (50%) of ITDMs now report this as their most time-consuming task – up from 44% in 2021 . While emerging technologies such as AI can


certainly help and be part of a company’s cybersecurity proposition, it’s not the ultimate solution. It is instead crucial that security leaders continue to remain vigilant to the basics - as it is only by placing good every day security practices at the heart of their cyber strategy, and embedding them within company culture, that they can meet the persistent threats facing businesses today. To get started establishing good cyber hygiene, businesses must address four key steps.


44 | November/December 2024


Mastering the basics Te most effective defences, and sometimes the hardest to get right, are the security basics. New emerging technologies, while promising, should never be used as a substitute for a strong cyber foundation. As the number of devices and locations


information is being accessed increases, thanks to hybrid working, maintaining the basics are even more important as ITDMs visibility over the network is reduced. It is common to find companies without an understanding of what services and servers they have exposed to the Internet.


Without consistently enforcing security basics such as multi


factor authentication (MFA), regularly updating soſtware and patches, businesses will be at significantly increased risk of a breach. It may seem simple, but most recent high-level attacks have


happened not as a result of sophisticated methods leveraging AI, but rather, malicious actors able to get access through what looked like a minor issue. For example, the password spray method, checking if users are using the same password on multiple systems, can


www.pcr-online.biz


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64