{"id":445,"date":"2020-05-31T14:16:49","date_gmt":"2020-05-31T08:46:49","guid":{"rendered":"https:\/\/aimonks.com\/aibytes\/?p=445"},"modified":"2020-05-31T14:16:51","modified_gmt":"2020-05-31T08:46:51","slug":"cybersecurity-more-or-better","status":"publish","type":"post","link":"https:\/\/aimonks.com\/aibytes\/2020\/05\/31\/cybersecurity-more-or-better\/","title":{"rendered":"Cybersecurity: More or Better?"},"content":{"rendered":"<span class=\"rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\">2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>The <strong>security breach<\/strong> has been a significant concern for all the companies. Most organizations have had anti-virus software and firewalls in place for decades. Yet, even the most prominent organizations- Yahoo, Uber, eBay, WhatsApp &#8211; have fallen victim and suffered a data breach.<\/p>\n\n\n\n<p>Companies are investing more in cybersecurity to prevent themselves from falling prey to data breaches. Despite this data, breaches are only becoming more frequent. What&#8217;s wrong with what they are doing?<\/p>\n\n\n\n<p><strong>Investing <\/strong>more in cybersecurity isn&#8217;t enough; the problem is that technology isn&#8217;t utilized correctly. Companies need to build security into IT solutions rather than incorporating it later as an after-thought.<\/p>\n\n\n\n<p>As more and more business operations are coming online, the s<strong>urface area for attacks is expanding <\/strong>and becoming more complex. It is difficult to rely on a single technology to deal with new security threats emerging every day.<\/p>\n\n\n\n<p>A company&#8217;s digital footprint is continually shifting. The cybersecurity technology in use today might not be fit to use in the future. A company should safeguard applications by developing design patterns for <strong>modern DevOps<\/strong>, which will keep the app up to date with security standards.<\/p>\n\n\n\n<p><strong>Read More: <a href=\"http:\/\/aimonks.com\/wp-admin\/post.php?post=542&amp;action=edit\">Is Automation Making Facebook&#8217;s Cybersecurity Staff Redundant?<\/a><\/strong><\/p>\n\n\n\n<p>Data breaches have a cons<strong>iderable impact on a company&#8217;s <\/strong>digital reputation. Data breaches can cost companies just under $4 million apiece. But over-sensitivity to security could keep senior executives and board members from optimizing financial returns from business analytics and big data.<\/p>\n\n\n\n<p>Companies need to factor security into their decision making and adopt <strong>new skill sets<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cloud security<\/li><li>Secure development life cycle<\/li><li>Integrating threat Intelligence into the protection platforms<\/li><\/ul>\n\n\n\n<p>The business world is taking cybersecurity seriously, but securing the digital landscape would need a <strong>holistic and highly strategic<\/strong> approach.<\/p>\n\n\n\n<p>#AIMonks #SecurityBreach #Security #CyberSecurity #DataBreach #Data #DevOps<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\">2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span> The security breach has been a significant concern for all the companies. Most organizations have had anti-virus software and firewalls in place for decades. Yet, even the most prominent organizations- Yahoo, Uber, eBay, WhatsApp &#8211; have fallen victim and suffered a data breach. Companies are investing more in cybersecurity to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":446,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61,9],"tags":[24,305,31,350,281,225,349],"class_list":["post-445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","category-investment","tag-ai-monks","tag-cybersecurity","tag-data","tag-data-breach","tag-devops","tag-security","tag-security-breach"],"rttpg_featured_image_url":{"full":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640.jpg",640,336,false],"landscape":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640.jpg",640,336,false],"portraits":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640.jpg",640,336,false],"thumbnail":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640-150x150.jpg",150,150,true],"medium":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640-300x158.jpg",300,158,true],"large":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640.jpg",640,336,false],"1536x1536":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640.jpg",640,336,false],"2048x2048":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640.jpg",640,336,false],"hestia-blog":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/05\/ransomware-3998798_640-360x240.jpg",360,240,true]},"rttpg_author":{"display_name":"AI Bytes","author_link":"https:\/\/aimonks.com\/aibytes\/author\/aibytes_kashika\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/aimonks.com\/aibytes\/category\/daily-bytes\/digital-transformation\/\" rel=\"category tag\">Digital Transformation<\/a> <a href=\"https:\/\/aimonks.com\/aibytes\/category\/daily-bytes\/investment\/\" rel=\"category tag\">Investment<\/a>","rttpg_excerpt":"Reading Time: 2 minutes The security breach has been a significant concern for all the companies. Most organizations have had anti-virus software and firewalls in place for decades. Yet, even the most prominent organizations- Yahoo, Uber, eBay, WhatsApp &#8211; have fallen victim and suffered a data breach. Companies are investing more in cybersecurity to [&hellip;]","_links":{"self":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts\/445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/comments?post=445"}],"version-history":[{"count":1,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts\/445\/revisions"}],"predecessor-version":[{"id":447,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts\/445\/revisions\/447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/media\/446"}],"wp:attachment":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/media?parent=445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/categories?post=445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/tags?post=445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}