Technology Record - Issue 25: Summer 2022

81 decisions against them. We’ve been able to take this a step further in using Microsoft’s toolset, by setting the risk and compliance modules inside Microsoft to help the board visualise, quantify and track risk over time.” By doing this, ITC Secure avoids overwhelming its customers with jargon and encourages them to save money by leveraging their existing relations with Microsoft. “Typically, the first thing we often do to help a company is to unlock the existing security products and benefits that they are paying for but aren’t using,” says Robbertse. “We help them reduce the complexity of other tools. And at a time when security budgets tend to be going up, this allows company leaders to reallocate that budget into other products and solutions to advance their cybersecurity.” Supply chains can also benefit from investments into stronger cybersecurity. For example, companies are using the internet of things and connecting to operational technology to track data from machinery and devices. Many of these devices were not originally designed to be connected to the internet, leaving them at risk for security breaches. “Using the Microsoft toolset, we’re able to help customers reduce that risk whilst enabling them to continue collecting and processing that data in the most secure way,” adds Robbertse. Many companies are beginning to question how to unlock the power and intelligence of the cloud so they can use it in the most meaningful way. To do this safely, ITC Secure encourages users to think about a security strategy for their digital transformation and secure identity and access management. “In this post-pandemic world, where hybrid working has become the new normal, a secure identity is very important in order to protect how the cloud is being accessed,” says Robbertse. “We use the Microsoft toolset to protect identities across enterprises, multiple cloud applications and enterprise resource planning systems.” The amount of data that is accessible to an individual can render an organisation susceptible to cyberattacks, especially if the individual has access to a vast amount of data. ITC Secure uses Azure Active Directory to adjust hybrid identities and reduce the risk associated with individuals’ access to company files, which can be exploited during a data breach. This automates an individual’s access to company data, meaning that if this identity was breached, the company would be able to identify exactly what information was in danger and act accordingly. “Employee access needs to be revised and checked so we automate as much of that as possible so that it's not down to any human being to monitor this.” As cyber threats rapidly proliferate and continue to increase in complexity, ITC believes that legacy approaches to cybersecurity will no longer suffice. Robbertse concludes: “As the saying goes ‘Security is always excessive, until it is not enough’, however with the right partner, cybersecurity strategies can be designed to not just manage risk, but also shift from a state of reactive, to proactive … and to even predictive.” ITC Secure provides round-the-clock protection for its global customers from its 24/7 security operations centre

RkJQdWJsaXNoZXIy NzQ1NTk=