Comments by Dan Davies, CTO at Maintel: “Following the confirmed cyberattack on The Guardian, business leaders should take heed and implement the correct tools to protect their systems.”

He adds, “It is imperative organisations put in place and update their security infrastructure constantly, as one chink in the armour could lead to a killer blow for the entire organisation. Cyber criminals are continuously probing and looking for weaknesses and it only takes a single vulnerability to gain access.”

Multi-layered attacks

Dan Davies continues, “A priority for security teams must be to reduce the time to detect, contain and mitigate breaches. This is a key strategy given those trying to gain access are now very skilled in delivering multi-layered attacks using diversion techniques.”

He adds, “The only way to go about this is by regularly scanning your environments for vulnerabilities, applying emerging technologies like predictive analytics with techniques such as machine learning and modelling as additional layers of the already complex security stack. Unfortunately, it's no longer a matter of if you'll be attacked, but when. So, it pays to be prepared.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...