sb-as logo
Story image

Cyber security can unlock economic growth, according to experts

Purely digital companies have distinct cyber security advantages over traditional businesses, according to to CSC, who says this fact is becoming increasingly clear.

Emerging digital businesses in the so-called “Experience Economy”, “Sharing Economy” or “Collaborative Economy” all use modern software and infrastructure that is resistant to cyber security threats. However, pre-digital businesses make up the vast majority of companies, and these businesses frequently rely on older systems, out of support software, and have multiple physical locations, making them much more vulnerable to cyber security attacks.   

“As emerging digital businesses show, robust digital connections underpin a strong digital economy,” says Sonia Eland, Director, Strategic Alliance Eco-system & Digital, CSC Australia and New Zealand.

“For new digital markets and economies to thrive and grow, these digital connections must be seamless, frictionless, and always-on, to meet users’ basic expectations,” explains Eland.

“Cyber security can play a key role in underpinning economic growth by making businesses and their customers feel confident about their digital interactions,” she says.

For pre-digital businesses looking to compete in the digital economy, Eland says it is essential to upgrade out-of-date and poorly-secured infrastructure.

“To delay these upgrades invites a raft of cyber security risks. These risks range from damage to brand image, non-compliance with regulations governing personally identifiable information (PII), and loss of customers.”

In the past, outdated and vulnerable systems led to a cyber security breach at Target. An older, but still very common, version of Microsoft Word, combined with email phishing via one of the retailer’s suppliers, enabled hackers to penetrate Target’s fortress walls and steal the credit card data of tens-of-millions of customers. 

“Cyber security and technology are among the most important issues for today’s businesses. For example, it’s clear that infrastructure complexity damages cyber security,” notes Eland

“Also, with mobility on the rise, the secure perimeter is not as clear. Further, businesses need greater visibility into when and how they have been attacked to reduce detection times, and be able to quarantine attacks before malware spreads to other devices and hackers have time to do damage,” she explains.

By addressing these infrastructure upgrade challenges today, companies will be in a much better place to harness digital opportunities in the future, Eland says.

“In many ways, we are only scratching the surface of connectivity, and its impact on our economy. Soon we will need to connect securely to billions of sensors, millions of devices and thousands of business networks, while enabling entire eco-systems of technologies, both old and new,” she elaborates. 

Eland adds, “Becoming digitally-capable is a necessity for all companies. Cyber security is no longer solely the responsibility of IT departments.

“It’s also a leadership issue that requires active involvement from the Board and the entire executive leadership team,” she says.

“Addressing security as a key challenge will not only create a safer environment for businesses and their customers, but will unlock a raft of digital opportunities that can stimulate growth throughout the economy.” 

Story image
NordVPN upgrades infrastructure with launch of colocated servers
"The greatest advantage of having colocated servers is their complete ownership, which guarantees access only by our authorised people."More
Story image
Microsoft takes legal action to disrupt botnet and combat ransomware
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world's most infamous botnets and prolific distributors of malware and ransomware.More
Story image
COVID-related email subjects biggest threat in phishing scams
Coronavirus-related email subjects remain the biggest threat in phishing scams, a new study has found.More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
Why best-practice threat data management provides confident automation
Understanding an organisation’s threat landscape requires having both the right threat data sources and the proper prioritisation to derive actionable threat intelligence for your organisation. More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More