Connect with us

Hi, what are you looking for?

Business

Different type of business stocktaking: Time for a cybersecurity check-up?

Time of businesses to review their cybersecurity arrangements? if so, what does this entail?

A Google logo is seen through windows of Moscone Center in San Francisco. © AFP/Getty Images
A Google logo is seen through windows of Moscone Center in San Francisco. © AFP/Getty Images

Cyberattacks continue to affect a variety of businesses. As an example, a vulnerability that has recently been highlighted by the FBI is where any stolen smartphone that has a credit card added to Apple Pay, Samsung Pay or Google Pay, and public transportation schemes enabled can be used by criminals to make unlimited payments at any point-of-sale (PoS) terminal.

The flaws lie in the contactless payment system, and can be exploited even when a phone’s battery is dead, as in the case of iPhones. Even the latest iPhone model have weaknesses.

Can we expect these concerns to continue into 2022?

According to expert Josh Rickard (Security Solutions Architect at Swimlane) it is important for businesses to periodically re-assess their cybersecurity systems.

Rickard tells Digital Journal this is particularly important within the context of 2021, “To re-evaluate their cybersecurity posture after a tumultuous year of cyberattacks across industries.”

Trends suggest that cyberattacks are not going away and they are generally increasing in terms of frequency. Rickard cautions: “The dramatic spike in ransomware and supply chain attacks illustrates that every company, regardless of vertical, is a software company and security will only continue to rise in importance when it comes to ensuring the continued operations of the business.”

This means that businesses should be building robust and proactive programs to counterbalance these external threats. As an example, Rickard recommends:  “To protect valuable information and prevent breaches, enterprises must invest in multi-faceted platforms that centralize and automate detection, response and investigation protocols. Security teams need full visibility into IT environments and the ability to respond in real-time to limit the consequences should a cyberattack occur.”

Rickard also puts forward the idea of automating and centralizing security processes. Through this he says: “Organizations can reduce the chance of human error while achieving infinitely smoother execution of security-related tasks and ultimately ensuring that highly-sensitive personal information is kept safe and secure.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

For the first time in the organization's history, all of the honourees are women. Each honouree is dedicated to creating positive change in the...

Social Media

It's time the world grew up and out of this madness.

Tech & Science

As well as the cost-of-living, many in the U.S. simply think the iPhone is too expensive.

Business

From a survey of some 1,000 adults, the findings have uncovered issues like distractions at home, struggles with communication, etc.