Safeguarding Edge Data in the Age of Decentralisation

 

The new paradigm shift toward data decentralization may signal a shift in how organizations approach edge protection. Cyberattacks can intensify existing security issues while exposing new gaps at the perimeter, posing several challenges for IT and security personnel. Infrastructure must be resilient to the security flaws introduced by the massive proliferation of devices that generate, capture, and consume data outside of the traditional data center. 
The need for a holistic cyber resiliency strategy has never been greater — not only for safeguarding data at the edge but for strengthening protection from all endpoints of a business to centralized data centers and public clouds.
But before diving into the perks of a holistic framework for cyber resiliency, it may help to get a deeper understanding of why the edge is often susceptible to cyberattacks, and how adhering to some tried-and-true security best practices can help tighten up edge defenses.
The consequences of human error

According to conventional IT wisdom, security is only as strong as its weakest link: humans. Human error can be the difference between an unsuccessful attack and one that causes application downtime, data loss or financial loss. According to IDC, more than half of new enterprise IT infrastru

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: