The Record - Issue 21: Summer 2021

77 H aving been in the information security field for many years, I have seen tremen- dous advances. Technologies like artificial intelligence and machine learning, that seemed like science fiction only a few decades ago, are now commonplace. However, not everything has progressed in a positive direction, including the cyberthreat landscape. Today’s cybercriminals are motivated bymoney and use sophisticated and stealthy cam- paigns to steal valuable data and commit iden- tity theft. The overall financial damage caused by cybercrime is projected to reach $6 trillion by the end of 2021 according to Cybersecurity Ventures, which is double that of 2015. Another big change that I have seen over the years is that cybercriminals are increasingly tar- geting small and mid-sized businesses (SMBs). The reason for this is simple: compared to larger enterprises, SMBs have weaker – and in some cases, non-existent – cybersecurity defence sys- tems. It is therefore much easier and highly prof- itable for hackers to attack smaller organisations. Customers often ask me what tools they should use to efficiently and cost-effectively improve their current security posture, and ultimately safeguard their data, employees, customers and reputation. The fundamental tools that I recommend are a centralised remote connec- tion manager, a Privileged Access Management (PAM) solution, and a bastion server. A centralised remote connection manager han- dles credential management in a secure manner and generates visibility to monitor and enforce compliance. At the same time, it supports exten- sive and customisable workflow automation, which reduces the risk of accidental data leaks caused by human error or negligence. A PAM solution delivers real-time alerts and notifications regarding login attempts, along with advanced workflows where approval is necessary prior to accessing a resource. I cannot overstate the importance of a PAM solution, considering that 74 per cent of data breaches start with privi- leged credential abuse, according to Securis. A bastion server prevents hackers who breach an endpoint from moving laterally across the network and accessing core servers in the infra- structure. These are crucial given the growing number of third-party supply chain threats, such as the recent Solorigate/Solarwinds attack that many have called the most sophisticated cyber- attack in history. The bottom line is that while technology is get- ting better and better, cybercriminals are evolv- ing and innovating as well. All organisations need to improve their security posture now, not later. The costs and consequences of getting hacked can be catastrophic. Maurice Côté is the vice president of business solutions at Devolutions Improving your security posture While technology is getting better, cybercriminals are also learning to evolve and innovate to match the landscape. Businesses must implement the right tools now to stay ahead MAUR I C E CÔT É : DE VOLUT I ONS V I EWPO I NT “All organisations need to improve their security posture now, not later”

RkJQdWJsaXNoZXIy NzQ1NTk=