You can be on Entrepreneur’s cover!

Lessons We Can Take From the Battlefield to Bolster Cybersecurity What makes sense for defense in the real world is just as good an idea in the virtual world.

By David Canellos

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

In what seems to have become an almost daily ritual, millions of Americans regularly find themselves waking up to yet another large-scale cyber-attack against a high-value target, most famously right now the attack on Sony by, allegedly, the North Korean government.

As the world becomes increasingly connected and digitized, one revelation has become abundantly clear: traditional defensive mechanisms for protecting financial and personal information are not enough, and alone can no longer represent the best means for defending our critical data. Given the new reality of the situation it's time we begin to look at traditional battlefield techniques for lessons in our ongoing cyber battle.

Related: FBI: North Korean Government Was Indeed Responsible for Sony Hack

A time honored defensive battle strategy is reducing the footprint of what needs to be defended, and then concentrating one's defensive forces around guarding that perimeter. A comparable cyber equivalent to this strategy includes deploying modern day IT "weapons": encryption and tokenization technologies. These technologies camouflage parts of sensitive data, such as payment card data and banking account details, essentially forcing would-be hackers to try to hit targets that are constantly moving and nearly invisible. Through the implementation of these defensive strategies, companies are able to better guard their perimeters by dramatically shrinking the number of systems where valuable data flows in the clear.

Removing targeted data from external systems, such as cloud-based software, creates an increasingly difficult task for our cyber-criminal enemies. While the natural inclination to address the issue of data traveling to cloud applications may be to block them entirely, the fact is, that does not represent a practical battle tactic. With the wide-spread adoption of the public cloud by enterprises, IT and security managers now have broader and growing "IT perimeters" where sensitive data (payment card data, healthcare data, banking data, etc.) can flow and that represent the new reality in which we live.

In order to achieve business objectives and ensure productivity, many cloud technologies, such as cloud-based customer support systems, need to have access to select aspects of "sensitive" data in order for users of these systems to do their jobs.

Related: CEOs Can No Longer Sit Idly By on Cybersecurity

For this reason encryption and tokenization solutions for the cloud must to be smart enough to not interfere with the operation of the cloud systems, but still safeguard the information that needs to be accessible via these enterprise systems. Now combining tight security with access that does not impede production can be a delicate balance, therefore we recommend adherence to these three critical considerations when making decisions:

  • Only strong, well vetted encryption and/or tokenization solutions should be used. Always look for solutions that have been audited by accredited third parties.
  • Enterprises need to maintain control of any and all encryption keys and/or the token vault, if tokenization is used.

  • Encryption/tokenization solutions must not interfere with the important aspects of the cloud systems that enterprise end users depend on, such as being able to search on names, account numbers, the last four digits of accounts, etc.

The cyber battlefield is evolving daily. New tactics and strategies are being deployed with regularity in what can only be described as a modern day arms race. In order to safeguard their critical assets, organizations need to take proactive steps to defend their digital footprint while ensuring seamless business continuity. By employing strategies learned from the conventional battlefield and coupling them with modern cyber defense technologies, enterprises can keep would-be enemies off balance and ensure productive operations.

Related: A Lack of Communication on Cyber Security Will Cost Your Business Big (Infographic)

David Canellos

President and CEO, Perspecsys

David is president and CEO of Perspecsys. Previously, David was SVP of Sales and Marketing at Irdeto Worldwide, a division of Naspers. Prior to that, David was the president and COO of Cloakware, which was acquired by Irdeto. Before joining Cloakware, David was the general manager and vice president of sales for Cramer Systems (now Amdocs), a UK-based company, where he was responsible for the company’s revenue and operations in the Americas. Prior to his work with Cramer, David held a variety of executive, sales management and business development positions with the Oracle Corporation, Versatility and SAIC.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Business News

James Clear Explains Why the 'Two Minute Rule' Is the Key to Long-Term Habit Building

The hardest step is usually the first one, he says. So make it short.

Side Hustle

He Took His Side Hustle Full-Time After Being Laid Off From Meta in 2023 — Now He Earns About $200,000 a Year: 'Sweet, Sweet Irony'

When Scott Goodfriend moved from Los Angeles to New York City, he became "obsessed" with the city's culinary offerings — and saw a business opportunity.

Business News

Microsoft's New AI Can Make Photographs Sing and Talk — and It Already Has the Mona Lisa Lip-Syncing

The VASA-1 AI model was not trained on the Mona Lisa but could animate it anyway.

Living

Get Your Business a One-Year Sam's Club Membership for Just $14

Shop for office essentials, lunch for the team, appliances, electronics, and more.

Leadership

You Won't Have a Strong Leadership Presence Until You Master These 5 Attributes

If you are a poor leader internally, you will be a poor leader externally.