With so many digital users and equipment lacking in good quality cyber protection, is the new Cyber Security Mesh the answer? Traditional Cyber Security Designed has been built based on old methods of accessing and using data Pre-COVID, in contrast the last 12 months have propelled a very different path for cyber security.
Increasingly employees are working from home and other societal aspects have also determined increased internet use. With reliance on online ordering from food menus, paying for goods with smartphone wallets and online training / meetings, the need for a more stable and secure cyber security system is essential.
Historically, a company’s cyber security strategy would be to ring fence their IT with cyber protection at their premises. Like building a secure wall around the organisation which would include standard firewalls and anti-virus software. This ring fence rolled out into company laptops and smartphones which were used for work purposes, outside of the office.
However, when COVID hit, employees were no longer required to base themselves at the office and often had to use their own IT equipment as a means of getting up and running. Personal devices didn’t always meet the company’s cyber security strategy but had no choice but to use them as options of additional equipment were limited.
What is a Cyber Security Mesh?
Post-COVID and protecting IT equipment is now being assessed very differently. By introducing a Cyber Security Mesh, “this type of protection recognises that there are no physical boundaries”, according to a recent article by E-SPIN. Instead of building a physical boundary around the company and focusing on the office building, businesses now need to focus on individual protection around each user. Processes should be moved to a cloud-based service, where they can be monitored more closely, rather than through individual devices.
With this, a Cyber Security Mesh can provide a more robust approach with flexibility and blockchain nodes at the heart of cyber protection. This will allow vulnerable cases of digital violation to be isolated and not infiltrate into other systems. It also gives IT managers far more control on who, when and where systems can be accessed.
To find out more about protecting your company with cyber security insurance, please contact our insurance team. We support companies small or large with cyber attack insurance and GDPR data protection insurance, to assess if they have the right cyber security strategy in place to protect their business.
Blogs used to write this article: