Select Page


There are 4 pillars of cyber security for you to apply in your organization.

  1. Policies & Planning
  2. Use of Technology and observe in-house Security
  3. Employee Education and Awareness
  4. Backup and Disaster Recovery


Pillar 1: Policies & Planning


The first pillar of cyber security is to establish the clear cyber security policies. Policies and procedures define how to apply various technological security solutions effectively. An ideal security policy should have a defined risk-versus-cost rule that can be applied to other policies and procedures within the enterprise. A policy need not define the technology to be used as technologies keep on changing and getting refined with time. Some enterprises have even adopted multiple security policies, one for every segment or division as per the risk factors of the enterprise and its domain.


Pillar 2: Use of Technology and Observe In-house Security


Once an organization has a security policy in place,the next step involves looking for an appropriate technology for its security needs. Technology assessment may require the role of cyber security and cyber analytics experts to look for the best tools available. A decision on the use of adequate tools like processes for identification of users, systems,hardware, access control, data encryption, firewalls, virus protection programs etc all come under the purview of technology.

Technology based cyber security tools are proactive as they are constantly monitoring for any change in the normal functionality of processes. On the downside, they can be accessed by hackers. Just one small entry into the security systems or a small breach can be enough to trigger a shutdown of such safety tools.


Pillar 3: Employee Education & Awareness

Educating the employees on recognizing the ‘bad’ by offering real time information sharing can go a long way in keeping risks at bay. Fraudulent emails, phishing and opening of unwanted email attachments continue to be major reasons allowing entry or access to hackers. With an employee awareness drive, such behavior can be controlled resulting in better security analytics in place.

The recently infamous crypto malware or ransomware ‘Wannacry’ is a typical example of a data breach that had its roots in the opening of malicious email attachments. Here the the need of cyber security specialists increases to protect the data from hackers By keeping the employees aware and educated on cyber security aspects, an enterprise can minimize its security risks substantially.


Pillar 4: Backup and Disaster Recovery


Ensure your data recovery and business development solution provider offers adequate and regular backup check on the recoverability of the data. Stimulate a worst case scenario by shutting off your server and seeking data backup to ensure you are always ready for any data breach eventuality. Stimulation can also ensure there is no panic and every employee knows their role during any cyber attack to ensure minimal downtime and affect on important data and services.