Home Magazine Three strategies to reduce costs and improve cybersecurity

Three strategies to reduce costs and improve cybersecurity

Threat detection services can help you monitor and detect increasingly complex threats

Defending against cyber attacks is increasingly important and an expense that no business can do without. Nir Sasson, Network Security Consultant at Avnet, says there are practical steps to be taken that can reduce costs without compromising security.

Cybersecurity costs businesses a lot of money – and with no measurable monetary income as a result. That leaves executives and board members scratching their heads and wondering: “Why are we spending so much on this? Why do we need to employ expensive professionals to manage and operate cybersecurity?” Often leading them to ponder: “We know cybersecurity is important, but how do we determine the right level of investment?”

We’ve developed a list of three strategies you can use to maintain good cybersecurity hygiene, while still managing costs.

1. Manage to the exception

Managing to the exception is the principle that will allow your organisation to maintain a proper cybersecurity defence. It means starting from the worst-case scenario, or the exception to the status quo, and working backward to create your strategy from there.

Take the example of password management. Organisations using the username and password authentication method to verify their legitimate computer users must also provide a mechanism to help validate users who are having a problem. For example, they may have mistyped the password, are locked, and can’t log in to the system.

The ideal strategy starts with focusing on the small percentage of people who will forget their username or password – the exceptions. With the exception identified, the organisation can plan and implement special measures to deal with the uncommon cases when the self-management process failed.

The next step is looking at what the solution is and figuring out if it can be automated, which leads us to our next strategy.

2. Automation: Transfer tasks that do not require human judgment to a machine

Knowing when to utilise automation can save companies a significant amount of money. Look for tasks that don’t require human judgment. Tasks like granting permissions to users who meet certain standards or automatic alerts when they meet predefined rules.

Implementing cybersecurity strategies for OT systems is a must when striving to achieve The Connected Enterprise

Going back to our password-management example, we have now determined that we need to deal with users who get locked out. Typically, how is a user unlocked? He calls the help desk. The operator at the desk helps identify the user who phoned him as a condition for providing the password reset service, asking a series of security questions.

This process can be transferred to an application, doing precisely the same thing. Instead of a human operator, a machine can check the correctness of the user’s answers and reset the password for him.

With one fix, we can dramatically reduce costs and the organisation still has strong authentication systems in place.

3. Know when to outsource and when to keep it internal

Your organisation most likely creates and stores vital information that, if exposed to an unauthorised entity, could result in an unbearable impact on your business. While important to protect, you most likely aren’t able to spend all your time on that one task – there is still the day-to-day, essential work that it takes to maintain the company.

If you do not possess the in-house capabilities required to gain and keep a good cybersecurity posture, the solution is not to give up on it entirely or to make compromises. That is when you should bring in an outside source to help.

Rockwell Automation LifecycleIQ™ Services works with organisations across a wide range of industries to take a proactive approach to cybersecurity. Our threat detection services can help you monitor and detect increasingly complex threats. We provide comprehensive cybersecurity solutions to manage the operation of network security devices and applications, such as firewalls, intrusion prevention/detection, etc.

Cyber defence costs money, but it is possible to reduce the costs without compromising cybersecurity, and maybe even improve your defence.


www.rockwellautomation.com | EPopova@ra.rockwell.com |
t: +44 (0) 870 242 5004