The Times Australia
Google AI
The Times Technology News

.

Spotlight On Devices This Cyber Security Awareness Month: Businesses Need Complete Attack Surface Visibility To Protect Assets

  • Written by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis

The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats.

They have outlined four simple steps for all Australians to improve their cyber security – turn on multi-factor authentication; keep devices and software up to date; use strong and unique passwords and recognise and report phishing.

The spotlight on individual responsibility is encouraging and helps to address the expanding attack surface created by the ever-increasing number of devices, which in turn introduces a multitude of potential vulnerabilities. In fact, research from Armis revealed that tablets, media players, personal computers and mobile phones were among the top 10 device types with the highest number of attack attempts.

Expanding attack surface

While adopting MFA and strengthening passwords are non-negotiable in today’s threat environment, ongoing security updates and patching discovered weaknesses are equally vital. Consumers must also be educated on the threats posed by their devices through lax security protocols, standardised product class passwords and insecure use. Each unsecured device adds another layer to the expanding attack surface.

Businesses too are under threat, as devices move between personal and corporate environments, potentially encountering unsecure networks. As the proliferation of connected devices continues, it becomes imperative for organisations to monitor and manage them. They are increasingly inundated with a growing mass of devices connecting to their business-critical data and infrastructure. Nearly every business now relies on these devices for many processes through managed devices. As a result, organisations end up not knowing what or how many assets they have.

The cornerstone of effective cybersecurity for businesses is visibility

To achieve true resilience against ever-evolving cyber threats, a proactive approach is needed. This includes comprehensive identification and real-time monitoring of all connected devices, along with the ability to identify and swiftly mitigate vulnerabilities across the entire attack surface.

Just like you can’t fix a problem you don’t know exists, you can’t protect assets you can’t see. The first step is achieving complete attack surface visibility. This means identifying all connected devices, including known and unknown physical and virtual assets, that are connected to the network.

While eliminating all risks is impossible, prioritisation and continuous monitoring are crucial. By investing in real-time asset intelligence, vulnerability analysis, AI-powered threat detection and remediation, organisations can proactively mitigate and manage their cyber risk exposure.

Furthermore, organisations must keep cyber exposure front of mind. This means using AI-powered platforms to help see, protect and manage all their assets in real time against potential threats.

Doing so ensures they can proactively mitigate risks, remediate vulnerabilities, block threats and protect their entire attack surface.

Times Magazine

Efficient Water Carts for Dust Control

Managing dust effectively is a critical challenge across numerous industries in Australia. From sp...

How new rules could stop AI scrapers destroying the internet

Australians are among the most anxious in the world[1] about artificial intelligence (AI). This...

Why Car Enthusiasts Are Turning to Container Shipping for Interstate Moves

Moving across the country requires careful planning and plenty of patience. The scale of domestic ...

What to know if you’re considering an EV

Soaring petrol prices are once again making many Australians think seriously[1] about switching ...

Epson launches ELPCS01 mobile projector cart

Designed for the EB-810E[1] projector and provides easy setup for portable displays in flexible ...

Governance Models for Headless CMS in Large Organizations

Where headless CMS is adopted by large enterprises, governance is the single most crucial factor d...

The Times Features

HARRY POTTER™: THE EXHIBITION TICKETS NOW ON SALE!

An Enchanting Exhibition Celebrating the world of Harry Potter Opens in SYDNEY on 14 MAY Get r...

Leader of The Nationals Matt Canavan - Sky News Interview

SKY NEWS TRANSCRIPT WITH HOST PETER STEFANOVIC; FUEL CRISIS; PAGE RESEARCH CENTRE REPORT ON LIQUID F...

Taste Port Douglas 10-year celebration

Serving up more than 40 events across four days, the anniversary edition  promises a vibrant cel...

Is dark chocolate healthier than milk chocolate? 2 dietitians explain

Easter chocolate is all over supermarket shelves. Some people reach straight for milk chocolat...

Compulsory super is higher than ever at 12%. But cutting it would hurt low-paid workers most

A central element of Australia’s superannuation system is the superannuation guarantee[1] (SG). ...

Grants open for port communities across the Hunter and Northern Rivers regions

Local organisations doing important work across the Hunter and Northern Rivers regions are being...

AI Is Already Here. The Question Is Whether Your Business Is Built for It

We sat down with Nirlep Adhikari — CTO at LoanOptions.ai and Founder of Mount Mindforce — to cut...

Cleared to Land — and Cleared to Die: How a Runway Failure Killed Two Pilots in Seconds

A modern passenger jet, operating under full clearance, descending onto a controlled runway at o...

Leader of The Nationals Matt Canavan - press conference

CANBERRA PARLIAMENT HOUSE PRESS CONFERENCE WITH SHADOW WATER MINISTER MICHAEL McCORMACK; MURRAY-DA...