Menu

0Comments

Creating Secure, Transparent Digital Infrastructures ~Entrust

Juan Rodriguez explained the most secure and preferred way of creating secure and transparent digital infrastructure

Advertisement

Creating Secure, Transparent Digital Infrastructures ~Entrust
Guests following on Juan Rodriguez’s presentation at the CIO100 Symposium and Awards. (Photo: CIO Africa)

Security begins with secure infrastructure and with strong security practices and procedures. For hardware-based security systems, the most basic building block is a physical Root of Trust (RoT)

European Sales Director – Digital Identity at Entrust Juan Rodriguez explained the most secure and preferred way of creating secure and transparent digital infrastructure at the CIO100 Symposium and Awards.

In a year, Cyber attacks cost $18.3 million; 27% of these attacks mostly originate from internal staff. This data makes clear the importance of having a secure and transparent digital infrastructure. In the digital world currently, there are a lot of risks that firms should be on the look out for. We are all digitizing and we ought to understand the risks and protect themselves from them.

Advertisement

Rising cyber attacks, new data privacy regulation, smart devices usage and the Cloud all pose threats and risk to your digital infrastructure.

To shield your organisation from these risks, you’ll need to consider a couple of things.

Checking your connection is important because breaches in your network will come from your connection. It is important to get protection from your connection accessing your data.

Breaches can also originate from updates and upgrades done to your digital infrastructure. For this you will have to get a software that will manage your installations, updates and upgrades.

Advertisement

To develop a secure digital infrastructure you will follow the following steps as advised by Entrust’s European Sales Director Juan Rodriguez;

  • Design a strategy.
  • Secure the data and encrypt the information
  • Data in motion _ To connect and protect integrity and privacy
  • Data access – Identinty and device
  • Build a strong trust environment

Advertisement

Do you have a story that you think would interest our readers? write to us editorial@cioafrica.co

Advertisement