Modernize IT infrastructure

B2B Cyber ​​Security ShortNews

Share post

Southwest Airlines, one of the largest and most respected airlines in the US, was forced to cancel around 45 percent of its scheduled flights during the winter holidays. It is probably due to outdated IT infrastructure and IT systems. Other airlines have also struggled with inclement weather and holiday traffic, but have not faced the same level of disruption.

These few examples show that when companies are using an outdated, inefficient IT infrastructure, it will eventually buckle under the pressure of unexpected changes. Some companies hold on to their legacy systems because they see no point in changing something that is working well. However, a single change is enough to cause a major collapse, not just from bad weather or high customer demand. Major stresses can also include security-related events such as a security breach or even new regulatory and compliance requirements.

Security as part of modernization efforts

The good news is that many companies have proactively modernized their operations by moving processes to the cloud. One of the most common mistakes, however, is that IT security often falls by the wayside, as Lookout says. Sascha Spangenberg, Global MSSP Solutions Architect at Lookout, explains, “The reality is that with digital transformation comes new end-user expectations and security requirements. Employees will likely want to use their own personal devices when working remotely. With cloud-native applications, data can now be accessed from anywhere and on any device. This means businesses no longer have the visibility and control they were accustomed to when everything was on-premises.

Cloud-native security solutions

In an effort to support hybrid working, organizations can enable their users to access corporate resources from anywhere. However, without cloud-native security solutions that can keep pace with these changes, they are unprepared for major security incidents. Security breaches are one aspect of this, where a single account takeover can result in the loss of sensitive data. Added to this is compliance with regulations. Regulated data can be protected when there is no visibility and control over cloud operations. By modernizing IT security, organizations are able to:

  • Simplifying the complex IT security architectures that route all IT traffic to physical data centers.
  • Freeing overburdened and understaffed IT security teams from the day-to-day management of appliance-based web proxies, virtual private networks (VPNs), and data loss protection (DLP) controls.
  • Better security efficiency with adaptive and inline security controls.
  • Better user experience and higher end-user productivity.

Reduce the complexity of IT security

In order to benefit from the advantages of a modernized IT system, companies must adapt their security strategy accordingly. The answer lies in a unified, cloud-delivered security platform that combines endpoint security with secure access to applications and data. With all security controls in one place, businesses gain more visibility and control with fewer potential complications.”

More at Lookout.com

 


About Lookout

Lookout co-founders John Hering, Kevin Mahaffey, and James Burgess came together in 2007 with the goal of protecting people from the security and privacy risks posed by an increasingly connected world. Even before smartphones were in everyone's pocket, they realized that mobility would have a profound impact on the way we work and live.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more