APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    IT Security for medium-sized businesses and enterprises in Australia

    Vlad Vyshnivetskyy, Head of Cyber Security at PICA Group

    Tweet
    content-image

    Vlad Vyshnivetskyy, Head of Cyber Security at PICA Group

    Information Security (InfoSec, Cyber or IT Security) is a critical component of any business. Confidentiality, Integrity and Availability of IT assets are paramount in the modern digital and technology-centric world.

    In Australia, medium-sized businesses and enterprises (20-400 employees) face the same typical IT security threats as larger corporations – big end of town. This article will look at the various aspects of IT security for such businesses. Thus let's start with...

    Challenges

    Despite being medium-sized, these businesses still mostly lack a dedicated IT staff or have limited IT and IT Security resources. Coupled with a limited budget, this reflects that lean businesses have a primary focus on business aspects to survive in their competitive areas. Respectively, IT and IT Security functions usually have less recognition and support from senior management as compared to the main business, resulting in the depreciation of respective IT Security risks and threats.

    Slowly, business leaders start to realise how heavily their operations depend on IT and how severe could be the outcomes of IT Security risks. Therefore – let's look at the common…

    Threats

    Despite the challenges, the threat landscape for medium-sized businesses and enterprises in Australia remains the same as for large corporations – no discounts for size or smaller budgets and resources.

    Daily business threats consist of malicious emails and phishing attacks, signalling the need for staff security awareness knowledge and practice of cyber security hygiene. Ransomware attacks are also very common, sided with threats of data breaches. Accidental or intentional insider threats are likewise present in everyday routines.

    IT infrastructure operations, either on-premises or in a cloud, deal with threats of misconfigurations, unpatched or outdated software, 3rd party & IT supply-chain, zero–day vulnerabilities, and legacy systems. Limited IT Security staff often struggle to maintain up-to-date policies, procedures and working documentation.

    The easiness for regular business users to access Software-as-a-Service resources (shadow IT), wide adoption of remote access and staff working from anywhere – these are not new but more and more present threats from modern business practices.

    So how to face these threats? The answer is in …

    Remediations

    Remediation controls to counter the threats relate to either technology, process, or people.

    They can be further classified by criticality – essential, recommended, or advanced controls (in order of criticality).

    Essential controls

    Essential technology controls could start with the Australian Cyber Security Centre's Essential eight strategies (which could benefit any business worldwide), even at Maturity Level Zero. These include application control, patching, hardening, MS Office macro settings, restricting admin privileges, patching operating systems, configuring Multi-Factor Authentication, and backup data.

    Other technology essentials are – endpoint protection (EPP), network firewalls, secure email gateway (SEG), and virtual private networks (VPN) with remote access management. Disaster Recovery (DR) configuration, strategy and procedure, and well-planned backup strategy are other strong points for businesses, especially with noticeable on-premises IT assets.

    In terms of processes, it is vital to formalise IT Security policies, work procedures and guidelines. This will require respective user education, which focuses on People's IT Security awareness training, ideally with tests and simulations. Approval of IT Security policies by the CEO will also engage executive leadership support and get more compliance from all users.

    It is hard to imagine any medium-sized business surviving in the modern threat landscape without having these essential controls implemented. Even if some of them are not in place or don't cover 100% of IT assets and users, it is a matter of time before a cybersecurity incident happens.

    Recommended controls

    Besides essentials, it is also recommended to invest in Data Leak Prevention (DLP), Secure Web-gateway (SWG), Cloud Access Security broker (CASB), and Vulnerability Management (VM) control. Processes could benefit from formalised Incident Response (IR) plan, periodic IT Security penetration tests, and third-party security assessments. Access to a professional Virtual Chief Information Security Manager (vCISO) is also a prudent measure.

    The adversaries need to succeed only once out of endless attempts, while security measures should always be on top of all threats

    These controls help to address more sophisticated threats or decrease the severity of incidents if they happen.

    Advanced controls

    If the business has a high-value and low-risk tolerance, more advanced IT Security controls would include Security Information and Event Management (SIEM), Managed Detection and Response (MDR) delivered by a Managed Security Services provider (MSSP), Encryption of data at rest, and Cloud Access Posture Management (CAPM), especially for cloud-hosted IT Assets.

    An independent IT Security assessment conducted by a professional assessor could help highlight weak spots or define an IT Security strategy. Businesses can assess their IT Security posture against the most adopted Cyber Security frameworks, like ISO 27001 standard (Information Security Management System) or the National Institute of Standards and Technology (NIST - US department of commerce).

    Suppose a business invests in the development of its own business applications or strongly depends on e-commerce operations. In that case, these assets should be respectively covered by their own Application and Web-sites security controls. However, these aspects are outside of the scope of this article.

    Conclusion

    As the closing remarks, IT Security is not a point-in-time static state but a journey, constantly reviewing all the threats mentioned above, controls, and challenges.

    Once implemented, many of these controls require daily, monthly, quarterly, or annual operations, maintenance, and review. Delivered either by in-house staff or outsourced to contracted MSSP, IT Security is an aspect of survival for many modern businesses, and this trend is only increasing.

    The adversaries need to succeed only once out of endless attempts, while security measures should always be on top of all threats. And as every business user now uses technologies, IT Security is everyone's responsibility.

    Stay safe!

    tag

    Information Security

    Event Management

    review

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving It Transformation at Lactalis Australia

    Driving It Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    The AI Rat Race - Keeping Up with New Technologies or Waiting for Maturity?

    Andreas Kurz, Global Head of Digital Transformation, ALFAGOMMA Group
    The Role Of Digitalization In Transforming Airport Customer Experiences

    The Role Of Digitalization In Transforming Airport Customer Experiences

    Kebebew Bulto, Director Addis Ababa Bole International Airport, Ethiopian Airlines
    From Chemical Solutions to Data Center Innovations

    From Chemical Solutions to Data Center Innovations

    Akmal Zharif Bin Abdullah, Datacenter Manager, Aeon Credit Service (M) Berhad [KLSE: AEONCR]
    Ethics & Compliance in a Digital World: Navigating HCP Engagement in APAC

    Ethics & Compliance in a Digital World: Navigating HCP Engagement in APAC

    Sherene Cham, Regional Director, Ethics & Compliance – APAC, Menarini Group
    How AI is Driving Innovation and Customer-Centricity in Insurance

    How AI is Driving Innovation and Customer-Centricity in Insurance

    Xinfa Cai, Chief Innovation Officer, AIA Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/it-security-for-mediumsized-businesses-and-enterprises-in-australia-nwid-9381.html