Secure your business

Five cyber security trends to watch in 2017

Highlights
  • Digital technology enables businesses to amass big data, so the need for cyber security is greater than ever
  • Data needs to be safe in storage and safe in transit: consider siloing your storage and implementing blockchain
  • Security breaches mean reputational damage; assess your risk and don’t skimp on mitigating measures.

Leaders know their businesses can’t leave cyber security strategy to the last minute – because without it, the next attack might wipe out the company’s future.

The Internet of Things and cloud computing offer access to previously unparalleled volumes of data. Yet while the accessibility of this data enables operational flexibility, with it comes challenges to data security like never before. 

Image depicts online shopper holding credit card on laptop

Here are five areas of cyber security to keep your eyes on in the year ahead: 

Compartmentalise the cloud

Having a single site of complete, intact data is no longer necessary. “For very sensitive data, such as your customers’ personal information or credit card numbers, it makes sense to encrypt and disperse it across multiple locations,” says Neil Campbell, global security services director at Telstra. When using multiple storage sites via the cloud, information can be saved in many separate components, meaning a breach would only compromise a fraction of your resources and a partial address or credit card number is of no value to an attacker.

Audit data in-transit

Ensuring the integrity of your data as it runs from A to B can be a concern. One solution is blockchain, a peer-to-peer method of transmitting information that can be implemented into your workflow. Each piece of data distributed via blockchain carries its full history of movements and changes; when all the pieces are reunited these audit trails can be compared, revealing any attempted tampering.

Detect unknown unknowns

“If you notice that something is a little bit untoward in your network, go and look at it straight away,” says Telstra’s principal security expert, Katherine Robins. “Having the unknown unknown is a big problem because you don’t know how long they’ve been running in your network before they get detected.” Robins says the solution lies in machine learning behavioural analytics – teaching software to recognise strange behaviour in network environments. 

“Handled properly you can suffer a major breach and it goes away in a couple of days. Handled improperly, you are that one brand name that says cyber attack, right?"

Richard Metcalfe, ANZ Country Manager, FireEye

Plan for “when”

While you can’t stop every attack, being able to identify an attack quickly and mitigate damage can preserve clients’ confidence in your brand – and protect your bottom line. Richard Metcalfe, ANZ country manager for cyber security firm FireEye, sums up the importance of a planned incident response: “Handled properly, an organisation can suffer a significant breach and it’s forgotten by the public quickly,” he says. “Handled improperly, we have seen brands becomes synonymous with a breach.”

Lead the charge

As cyber attacks influence client confidence, so should they influence leaders’ priorities. Though past pushes for security came from the implementers, today’s chief executives are realising the need for comprehensive cyber security frameworks. Metcalfe says the questions executives should be asking are: “What’s our risk? How can we mitigate that risk with the resources we have or do we need additional resources to make that happen?” 

Learn how to proactively defend your business, brand, infrastructure and information assets against internal and external threats, with the Telstra Cyber Security Report 2017.

Find out more

Related News

Boxes on conveyer belt
Create transformative innovation
Create transformative innovation
IoT in focus: Transforming the supply chain

The Internet of Things (IoT) is powering a major digital transformation in supply chain management that's set to touch every part of the chain from floor to store and beyond. ...

Woman on her phone in an office setting
Liberate your workforce
Liberate your workforce
Making the switch to an IP-based telephony service

As traditional ISDN and PTN phone lines are decommissioned with the rollout of the National Broadband Network, Australian businesses need to find the right IP-based telephony s...

People standing around a workspace using a laptop
Optimise your IT
Optimise your IT
Fast, resilient and virtual: Our network for tomorrow

To meet Australia’s increasing demands for data, speed and network resiliency, Telstra is reimagining our network with software, virtualisation and 5G. The last decade has see...

tennis stadium
Reach global markets
Reach global markets
Over-the-top content with WTA and Perform Group

Across the world, sports fans are demanding higher quality video, with less delay and more features than ever before. We explore how the convergence of IP and traditional broad...