Skip to main content


Best practice cybersecurity for an evolving business landscape

Cillian McCarthy, chief executive officer, Paradyn: the company provides organisations with a 360-degree assessment of the gaps in their IT infrastructure, systems and processes

CIS Controls provide actionable steps to optimise cybersecurity for organisations of all sizes

As cyberthreats become increasingly sophisticated in a hybrid-working world, organisations cannot afford to be complacent about their cybersecurity strategies. CIS Controls are the globally accepted benchmark for cyber defence, providing specific and actionable ways to stop today’s most pervasive and dangerous attacks.

This recommended set of steps helps to optimise your cybersecurity landscape, ensures compliance and gives more control over your organisation’s systems. The controls are regularly monitored and updated to keep pace with the rapidly changing cybersecurity ecosystem.

Proactive approach to cybersecurity challenges

By using a highly proactive and collaborative approach, Paradyn is helping organisations of all sizes to implement these actions in order to protect their customers and the way they interact with stakeholders.

Paradyn provides organisations with a 360-degree assessment of the gaps in their IT infrastructure, systems and processes, reviewing the entire estate against the 170+ CIS Controls. Its security experts then recommend a tailored implementation and remediation plan.

From malware, email and web security to employee awareness training and penetration testing, the controls help to protect organisations against cyberattacks while aiding regulatory compliance with measures such as GDPR.

CIS Controls can also help to inform management objectives, prioritising areas that need attention and creating better ways of working and engaging with employees and stakeholders.

As security challenges evolve, so do the best practices to meet them. CIS Controls enable organisations to deal with new challenges and act as a guide to benchmark against peers. They can also provide a holistic framework to secure existing and planned business assets and resources, no matter how complex.

Click here to discuss your cybersecurity requirements in more detail.

IT security is first priority when preparing for risk

Fergal Meehan, head of government relations, Paradyn

Paradyn’s methodology uses a traffic-light system to explain to the business how vulnerable it is to cyber attacks


Organisations today are increasingly aware of the threat from cyber criminals. How they respond to it, however, is changing, with a growing emphasis on risk management.

As IT has grown to become central to the operations of every organisation a threat has grown with it: not only are cyber attacks increasingly common, in today’s hyper-connected world, the consequences of a successful one are worse than ever. In response to this, ever more sophisticated security solutions are being deployed, including the use of active threat hunting and artificial intelligence.

Beyond the technology there has also been a wider transformation. Increasingly businesses are looking to assess their readiness from the perspective of managing risk – and turning to specialist managed service providers to assess the risks to which they are exposed in order to prepare for them.

Of course, risk cannot be measured if the IT estate itself is not understood, so making sense of what systems an organisation uses is an essential first step.

“What we do is gap analysis, CIS and NIST, analysing the business from an IT perspective,” Fergal Meehan, head of government relations at managed security specialists Paradyn, said.

Paradyn’s methodology uses a traffic-light system to explain to the business how vulnerable it is, and where its weaknesses lie.

“If there’s something like a phone system, for instance, it will be a red, amber or green, and we then ascertain what the risk is to the business if it is amber or red. That’s very important for explaining it to management,” he said.

Working with public sector clients, Meehan found these organisations were leaning more than ever into taking security seriously and were now ahead of some areas of the private sector.

“Procurement can be an issue. Public bodies tend to know what they want, but the procurement process can be difficult,” he said.

“Certainly, we’ve seen a lot of growth in awareness of security.”

First and last line of defence

With IT security, the mantra has long been that attacks are not so much a case of ‘if’ as of ‘when’. With that in mind, information security itself, important as it is, is not the only method of managing and mitigating risk.

Meehan said that alongside traditional security measures, any serious risk mitigation strategy will take backups very seriously indeed as getting an organisation back up and running after a problem or breach is one of the most crucial tasks.

“A lot of the time it comes down to backups. You can have all of the systems and hardware in place, but at the end of the day the key defence is the backup,” he said.

This does not mean that security is less important, and Meehan advocates a ‘zero trust’ model that starts at the device. It is a case of acknowledging the reality of the growing threat and ever-widening attack surface.

“There is no such thing as being risk free, so what’s the next best thing? Well, to have good, good backups. Ransomware is one of the best-known threats

Backups themselves can be, and often are, a target too, and so they need to be unalterable. If they are not, then attackers can encrypt them meaning a business will not be able to get up and running again after an attack.

“[We do] off-site backups, which links into the space around disaster recovery. We airgap the backups, creating immutability. This means you have a read-only version of the backups, so they themselves are protected from the threat of ransomware,” he said.

Working with a managed service provider, businesses can set recovery time objectives and recovery point objectives, as well as a comprehensive service level agreement. After this, however, they should not just sit back and relax. In order to ensure that they actually work when they are called upon, back-ups need to be tested.

“It’s important that you do your tests, and if you don’t have the expertise in house your service provider can do it for you. You do get customers who prefer to do it themselves as it means they don’t have their eggs in one basket: they have the backup as a managed service but they do their own testing in-house,” Meehan said.

Of course, one reason to have a managed service provider perform regular testing might be because an organisation has no internal IT team. Another, however, might be that the IT team is already overworked just keeping the lights on, and this is precisely when the risk of a breach will be at its highest.

“Even those that have IT departments are so stretched these days, particularly with cybersecurity,” Meehan said.

Click here to discuss your backup requirements in more detail.

Paradyn delivers cloud back-up to over 20,000 Microsoft365 accounts

Cybersecurity expert implements watertight back-up solution for Microsoft365 data


Company data is one of the most crucial elements of any business, but are you keeping yours secure enough? Data is facing ever-evolving threats such as deletion, corruption and ransomware attacks, and companies need to ensure that it is secured, compliant and quickly recoverable.

Do you know that backing up your Microsoft365 (M365) cloud data is your responsibility? Paradyn can help you to protect your entire M365 environment across Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams, with a cloud solution including automated back-ups and full data restoration.

Innovative back-up technology

Data hosted at Paradyn’s secure Irish-based data centres together with innovative Veeam back-up technology ensures no downtime for customers in the event of an incident, enables speedy disaster recovery, and eliminates data loss. All customers have access to a self-service portal where they can carry out information recovery and restores, in cases of accidental or malicious deletion. Paradyn can also restore any data that has been deleted.

Without back-up for Office 365, you have limited access to and control of your own data. You can fall victim to retention policy gaps, data loss dangers and open yourself up to serious internal and external security risks, as well as regulatory exposure. Paradyn’s solution can help to protect your critical data and ensure business continuity.

Paradyn is one of Ireland’s leading cybersecurity service providers, with a security-first approach to implementation, monitoring and ongoing support. Its team of highly trained network and security consultants deliver best-in-class advice and support, enabling customers to reduce their cyber risk and focus on delivering their core business activities.

Click here to discuss your backup requirements in more detail.

Compliance is key in the world of data

Paul Casey, chief operations officer at Paradyn: ‘We need to make sure and constantly verify that we’re still allowing the right people access to the right areas and no more and no less than that.’


Four years have passed since GDPR came into play and from it both challenges and the knowledge facing privacy are increasing

It’s easy to forget the panic surrounding GDPR before its introduction in May 2018, which forced organisations to treat data with the seriousness and care it deserves.

Four years later, its influence has been greatly felt in how businesses deal with data and their responsibilities, much to the point where data breaches and fines regularly appear in the news.

“What it’s done is it put the concept of personal information to the forefront of every business owner’s mind,” Paul Casey, chief operations officer at Paradyn, said. “You should be thinking about it early in the process; it should be in the initial planning phases.”

“There’s probably more of a focus on data protection with cases appearing in the news. At least once a month, there’s some new headline and that is solidifying that this is the standard and it’s here to stay.”

Casey brings up an interesting point that while GDPR has been around since 2018, the pandemic happening two years later changed the landscape.

With all workers moving off-premises and many likely staying that way into the future, either as fully remote or a hybrid model, data protection is now more complex than before. Now the onus is on protecting data in different locations like the cloud.

“If they’re working from home, there’s so much between where they are and your organisation’s data,” he said. “You have to make sure you can verify it’s the right person from the right location getting to the data and not somebody else in-between.”

It’s why practices like zero trust – which requires all users to be authenticated, authorised and continuously validated for security before being granted or keeping access to data, no matter where they are in an organisation’s network – are becoming so popular. The boundaries separating organisations and access have disappeared completely.

“A lot of organisations are putting in the components of a zero-trust architecture without having that as a strategic end goal,” he said. “They did that to cover the risk of employees at home, verifying that it’s still that person.”

“We need to make sure we put those divisions in place and the previous IT infrastructure idea of the corporate networks being your castle where everyone inside is safe and trusted and everyone outside are the bad guys, that’s long gone.

“We need to consider people behind the walls as much as those outside it are working for the bad guys and we need to make sure and constantly verify that we’re still allowing the right people access to the right areas and no more and no less than that.”

Focusing on ensuring all of these things are covered is more difficult when considering the global skills shortage in cybersecurity. Having a dedicated team in-house is a luxury only major multinationals can afford, so for most organisations, outsourcing security is the only way.

It’s why services like Paradyn SOC and SIEM are growing in popularity, but as Casey mentions, many don’t know where to start.

The good news is that there are cybersecurity frameworks to base your protections on, such as ISO 27001. They can help break down your responsibilities and requirements into more manageable chunks so you can assess where your blind spots are.

“When you look at it from a holistic, big picture side, it gives an IT manager or director of IT a roadmap on what to do,” he said. “It’s all measured out, there are milestones, KPIs, and they can show that the organisation’s security posture is going in the right direction.”

“If you’re not operating on one of these frameworks, it ends up being piecemeal and you won’t be aware of the gaps in these projects you’re running.”

The benefit of that framework and measuring it is that you have something tangible to show those at board level about the effects of your security measures. By presenting it in a way that they understand, it makes it easier to show how vital security is to the organisation.

There is further scope for encouragement with the EU organisation ENISA (the European Union Agency for Cybersecurity), which is trialling certification for cloud products ensuring that they’re up to a certain standard.

Similar to the standard ISO 27001 provides, it will give further confidence that organisations are treating data with the protection and care it deserves and is expected to come into play in 2023.

“It’s good to see this evolution because they’ve seen we’re missing a spot there,” Casey said. “They said, what can we do to validate and express confidence in these cloud environments, where all of our data is held at the moment?”

“If you look at cybersecurity budgets – and it isn’t necessarily an IT function, it’s an organisational function – there’s a big portion of that which relies on IT doing what it needs to do to protect where the data is.”

“They’ve almost all come together in a line to emphasise organisations’ responsibilities to protect the data. Whether it’s on-premise or in the cloud, paper or digital, personal data or additional bits, you protect it with the same best practices.”

Click here to discuss your GDPR requirements in more detail.

Taking Security to the next level with visibility a key element

Fergal Meehan – Head of Government relations at Paradyn


As attack surfaces evolve and change thanks to a new way of working, new security frameworks like SASE are rising to the challenge.

With the development of the past few years, as remote working is now part and parcel of many businesses, tracking everything you need to protect is a greater challenge than ever. With the average worker using multiple devices to log into the same accounts, there’s a greater impetus to track what’s on the network.

That means the attack surface for the average company is now more expansive than ever and requires the approach to education, technology and policies to be updated and expanded. Not to mention other concerns as highlighted by Fergal Meehan, head of Government relations at Paradyn.

“The tools and technology are out there, but it’s knowing how to position it, remediate concerns and figure it out in a cost-effective manner,” he said.

It’s why security frameworks like SASE (Secure Access Service Edge), which was originally coined by Gartner in 2019, are coming to the fore. In layman’s terms, SASE brings all security and connectivity tools and technology together into one single cloud-delivered solution.

Tools like DNS security, machine learning, data analytics and cloud-driven firewalls are all built into the same system, allowing you to connect users and deliver technology solutions that keep them secure.

Meehan sums up the benefits as allowing flexibility, reducing costs and enabling new digital business scenarios. In short, IT managers can adapt and tailor it around the everyday demands that a business and its departments have.

“We’re in an era where every business unit in an organisation survives on IT,” he added. “SASE works off the zero trust model and brings elements like full-content inspection, allowing you to integrate with your SASE solution.”

The critical component throughout all of this is visibility. As Meehan mentions, you can have all the technology solutions in the world, but if you don’t know what you’re protecting or see what’s covered, they’re not going to be effective.

Zero trust is where this process starts and creating an itinerary of devices connected to the network, your IT architecture, and similar assets is the first step to knowing what to protect.

With SASE, you can see everything with full identity awareness. Regardless of where a person is logging in, you have the relevant information needed for your business to stay safe, including what applications they’re using.

That visibility also brings an unintended benefit that is important to good security posture: reporting. Whether it’s daily, weekly, bi-weekly, monthly or in-between, having reports gives your company an extra level of awareness that can only benefit them in the long run.

This heightened awareness is beneficial, but it’s only good if you have the necessary measures to mitigate an attack, something companies can tend to forget about until a zero-day exploit happens.

“The technology is there to monitor so you’re aware of your inventory and where it’s at with updates, but it’s getting that reporting back down to the desk of the person responsible,” he said.

“Once you normalise that, it brings another checkpoint where you can decide to move from quarterly patch management to bi-weekly because these updates made you aware of what’s required.”

While protection is important, giving the business the necessary breathing space to operate in is also required.

For most IT managers, the challenge is finding the middle ground between protection and accessibility, and the good news is that more tasks like patch management are automated, taking away much of the regular heavy lifting.

Having all these security measures is pointless unless you have a suitable mitigation strategy, with back-ups being a key element of this strategy. Paradyn itself practice this through its service Vault365, which leverages the cloud to back up an organisation’s Office 365 infrastructure. As long as you’re aware that you need to protect the data in the cloud, you will have peace of mind.

Taking such measures isn’t just for convenience; it also meets compliance and data protection requirements. Showing your work goes a long way to reassuring auditors, stakeholders and customers that you’re handling data responsibly.

“At the end of the day, it’s to get to a point where all you need is an executive report saying these tasks are successfully completed, that you’re now in this state, and you can tick these boxes around compliance and data protection,” Meehan said.

Click here to discuss your security requirements in more detail.

Paradyn invests €500,000 in new Vault365 backup service

Cillian McCarthy, CEO, Paradyn and Pat Downing, Commercial Director, Vault365

Vault365 is a brand-new backup solution for data stored on premise and in cloud applications, including Microsoft 365

Paradyn, one of Ireland’s leading cybersecurity service providers, is today announcing it has invested €500,000 in the launch of Vault365, a brand-new all-in-one backup, ransomware and data protection solution for data stored on premise and in cloud applications, including Microsoft 365. The solution has been designed to enable the fastest data restore in the industry.

The company forecasts revenues of €750,000 in 2023 following the launch and is creating five new jobs over the next 18 months. Initially available for Irish-based customers, Vault365 plans to roll out their backup services in the UK within the next six months.

As Office 365 will only retain data for up to 90 days, Vault365 securely backs up and eliminates the risk of data loss on Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams. The easily-managed solution, which includes a Backup-as-a-Service (BaaS) option, also protects physical servers, virtual servers, cloud and Software-as-a-Service (SaaS) applications such as Salesforce. Businesses can leverage powerful search tools, fast and flexible recovery, and export options to perform eDiscovery across their entire backup environment.

All data is securely hosted at Vault365’s Irish-based data centres. This ensures local access to data if needed and minimal downtime in the event of an incident, with speedy disaster recovery enabled. Should any incident occur, including a ransomware attack, customers can quickly recover data with the fastest data restore in the industry. Customers also have control over their own data with secure and easy-to-use portal access.

Vault365 is hiring in the areas of sales and support to meet customer demand for increased data backup and security in an ever-evolving IT landscape. The company will be engaging with customers across private and public sectors.

Businesses can avail of a 30-day free trial of backup for Office365 following the launch of the new service.

Cillian McCarthy, CEO, Paradyn: “Proactively protecting data has never been more important in a world where security risks are higher than ever. We are one of a few Irish companies offering this service, which we’re launching to meet customers’ increasing backup and security needs for their mission critical data, regardless of where it is.. There is a common misconception that backup is included with Microsoft, and a solution like this is crucial for businesses to avoid irreparable loss or theft of their Office 365 data.

“Our engineers are experts in their fields, and Vault365 enables business continuity which, in turn, offers peace of mind to customers. We are also excited to make the solution available to our UK customers within the next six months. With Vault365, data is always protected and accessible in today’s uncertain technology landscape.”

Click here to discuss your backup requirements in more detail.

First things first in security

Paradyn COO – Paul Casey

Cyber crime as a service is the new reality, and businesses need to fight back with better defences. They can start by getting back to basics.

Remote working. Previously unknown exploits. Phishing. Smishing. Ransomware. Compliance. It’s a cliché to call the internet the Wild West, perhaps even an insult to the denizens of the old West, but the reality is that businesses today are under extreme pressure to ward off cyber attacks.

Businesses know this, but the question is: do they know how to respond to it?

“There is, I think, a recognition that the threat landscape has changed,” Paul Casey, chief operations officer at network IT and service management solutions company Paradyn, said. Legislation has had an impact, of course, notably the EU’s general data protection regulation (GDPR), which has lit a fire under companies that hold or process customers’ personal data.

“Following on from the likes of GDPR there is a lot more compliance among medium and small enterprises. Of course, large pharma, banking and governments were already used to a level of compliance,” he said.

Casey said that one of the important aspects of GDPR was that companies had to not only do the right thing, but demonstrate good faith. Insurers, too, want to see the right policies in place, otherwise they may adjust rates or even remove cover. “Even from an insurance perspective, businesses are looking to demonstrate that they’ve done the right thing,” he said.

Clearly, then, the pressure is on. There are methodologies out there, though, that can help, notably from the Centre for Internet Security (CIS) and National Institute of Standards and Technology (NIST), adherence to which can give businesses confidence that they are doing things right.

“Were doing a lot with CIS controls. There’s another one, NIST, and there’s also ISO 27001. They all work in similar ways: what they do is allow an organisation to examine and understand everything they do.” Casey said that adherence to these standards led to what he called ‘security hygiene’. “Cyber security hygiene is like personal hygiene: you will be more prone to infection if you are not looking after hygiene,” he said.

Despite the whirlwind of change, businesses have a responsibility to themselves and to their customers, one that is increasingly present in law. “The boundaries have all moved, but the fact is you still have to control things. You need to find out where you’re doing well and where you’re not and work from there,” he said. “That’s where the frameworks come in.”

The goal is a different way of thinking about security, one that means stepping back from saying ‘right, I need another box with lights on it’ and instead looking at the data, systems and network that run a business. ‘It’s really not about putting another box in,” he said.

In fact, businesses often trip up on basic measures including things such as patching and updates. The threat from this seemingly trivial fault is very real indeed and businesses may find they are entirely exposed as a result, especially as so-called ‘zero day’, or novel, exploits are on the rise. “The Chrome browser has had 12 zero day exploits this year alone,” said Casey.

In any case, businesses need to get the basics right before they can move on to more complex measures. As a result, auditing processes is at the top of Paradyn’s list of crucial steps to take in the fight to protect its clients from online criminals.

“If your processes aren’t right, if your users aren’t being trained, and your users on-boarded and off-boarded correctly, then there is a problem. These are things that organisations need to think about and it requires a formalised approach,” he said.

Casey said he is not arguing there is no requirement for new technology, however.

“There are next generation tools with the capability to mitigate against new threats, but if those tools are not implemented in the right way you’re not going to get maximum benefits or, if it’s particularly badly done, you’re leaving yourself open,” he said.

Paradyn also helps to produce reports for internal teams or for businesses own cyber security teams, helping to ease the burden on often already stretched IT staff. “Keeping on top of everything that is changing – the Windows 11 rollout, all of your ongoing projects – is a difficult job as it stands,” Casey said.

But keeping on top of things is essential. A recent report in trade newspaper Computing indicated that it is not only legitimate businesses that are leaning on service providers: strange as it sounds, hackers are now offering criminal gangs ‘exploit as a service’. As a result, the only possible response is to seek external help to fight off the growing threat.

“There’s a massive demand for security services,” Casey said. Little wonder.

Click here to discuss your cybersecurity requirements in more detail.

Paradyn and Cisco DUO deliver highest levels of protection

Paul Casey, chief operations officer and Cillian McCarthy, chief executive officer, Paradyn

Paul Casey, chief operations officer and Cillian McCarthy, chief executive officer, Paradyn

Best-in-class Multi-Factor Authentication protects businesses against 99 per cent of automated cyberattacks

A data breach will turn your entire organisation’s online life upside down. Even with reasonable password policies in place, people are still the weakest link in the security chain. Social engineering can convince even the most intelligent people to enter their credentials on a phishing site or give them up over the phone. The solution is Multi-factor Authentication (MFA). Paradyn has collaborated with Cisco to provide Cisco DUO, which verifies user identity and device health at every login attempt, providing trusted access to your applications and proactively reducing the risk of a data breach.

Here are four key ways in which Cisco DUO can keep your organisation secure:

Establish user trust: verify the identity of all users before granting access to corporate applications and resources
Gain visibility into devices: get detailed insight into every type of device accessing your applications, across every platform
Establish device trust: check the security posture and verify trust of all devices, corporate and personally owned, accessing your
Enable secure access to all apps: give your users a secure and consistent login experience to on-premises and cloud applications

MFA will provide your business with over 99 per cent protection against automated cyber-attacks. Cisco DUO is not only an MFA authentication solution, but will begin your journey to a complete zero trust security model that starts with a secure workforce.

“Multi-factor authentication enables IT administrators to rest much easier, knowing that they have deployed a security strategy that protects the company’s platforms and users alike, thus reducing complexity while ensuring access and boosting the flexibility of remote workers”, Cillian McCarthy, chief executive of Paradyn, said.

Paradyn is a leading provider of IT security and consultancy services in Ireland, offering a comprehensive, best-in-class suite of security services to monitor, protect and defend customers against today’s cyber security threats. Through its partnership with Cisco DUO, it provides businesses with a secure remote working environment.


Click here to discuss in more detail.

Paradyn and Veeam keep National Concert Hall’s show on the road

National Concert Hall Dublin

Cybersecurity experts implement watertight system for the high-profile venue

Paradyn is one of Ireland’s leading cybersecurity service providers, with a security-first approach to implementation, monitoring and ongoing support. Its team of highly trained network and security consultants deliver best-in-class advice and support, enabling customers to reduce their cyber risk and focus on delivering their core business activities.

As the trusted technology partner of the National Concert Hall, Paradyn has delivered a secure Veeam data backup, storage, and
disaster recovery solution to protect the venue’s Microsoft365 data.

Robust backup and recovery solution

Having recently rolled out Microsoft365 (including Office365) to its entire IT user base, the National Concert Hall required robust backup and recovery for this new deployment. Paradyn designed and implemented a tailored Veeam 365 Backup solution which backs up data for Mail, SharePoint, and Exchange Online.

All National Concert Hall’s M365 data is securely hosted at Paradyn’s data centres through Veeam’s technology, meaning no downtime in the event of an incident, enabling speedy disaster recover and eliminating data loss. Furthermore, the venue has access to a self-service portal where it can carry out information recovery and restores, in cases of accidental or malicious

“Having previously worked with Paradyn, we knew we could trust them to deliver on a resilient M365 backup solution”, said Philip Deacon, IT manager at the National Concert Hall. “Hosting a busy programme of events each year with multiple clients, we are confident that company and customer information is secure with backup and disaster recovery in one, so that our business can continue uninterrupted.”

“Veeam is like having an internal backup team and this solution enables us to provide proactive, real-time monitoring to the National Concert Hall,” said Cillian McCarthy, chief executive officer of Paradyn. “It’s not widely known that M365 doesn’t come with backup, which is why a solution such as this is essential for businesses. We have created a secure environment which
enables business continuity and protects against ransomware in a challenging IT landscape.”

Click here to discuss your backup and DR requirements in more detail.

The Security Process with Paul Casey – Paradyn COO

Paul Casey, chief operations officer, Paradyn: ‘A lot of cybersecurity is about getting the boring stuff right’

As anyone in the industry will tell you, there is more to cybersecurity than simply information technology: human factors are the main vector for attack, and, in the world today, the technology is the business.


Paul Casey, chief operations officer at Paradyn, said that with its security service practice, the goal is to help its clients with a holistic and best-practice framework to secure business assets and resources.

The bulk of Paradyn’s clients are in the government and enterprise sectors, both areas in which cybersecurity has shot up the agenda of management.

“From an IT or cybersecurity point of view, they tend to be more sophisticated than a mom-and-pop shop on the corner and would tend to have some level of internal IT, whether it’s focused on infrastructure or even has some focus on cybersecurity,” he said.

The company works with its clients to understand the business, where and how it is exposed to threats and then from there develop a strategy for keeping things secure.

Even organisations at this level where security has never been skimped on have had to learn lessons of late. And it is a tale that will be familiar to just about everyone.

“The last 18 months have put the focus on cybersecurity so much. Working practices have changed. Previously, most organisations had everyone inside the castle. Yes, you had some remote workers on the road, but generally you had a lot of control. Then a switch was flicked,” he said.

With the shift to remote work, new opportunities were created not only for businesses to move online and workers to consider relocating, but also for criminals seeking to profit from confusion and uncertainty.

The organised crime aspect of cyberattacks is what is truly different from the past, when hackers worked for bragging rights or simply to be a nuisance.

“Cybercrime is a business and a lot more money is involved [than before]. You can contract and hire ransomware organisations and split the profits. Frankly, it has been commodified,” Casey said.

The rational response to this world of professionalised crime is to accept the arms race is going on and to respond with equally professional countermeasures, he said. However, this requires more than throwing resources at the problem. Instead, the first step is to understand the risk.

“Obviously everybody is worried about ransomware, but it’s at the end of the process. It’s what happens after someone has given away credentials, clicked on something they shouldn’t have or something hasn’t been patched. We’re looking to take a step back and take a deep look at the business.

“It’s easy to get caught up in thinking ‘there’s a shiny firewall I need to buy’ or ‘I can get this software, but, ultimately, cybersecurity is a much wider thing. It’s about company culture, it’s about leadership, and it’s about business processes. A lot of cybersecurity is about getting the boring stuff right,” he said.

Casey recommends businesses look at the Center for Internet Security’s list of Controls, version eight of which is now available free online.

“CIS Controls is a set of best practices, and it forms part of what we use to identify, develop, validate, promote and sustain best practice solutions for cyber defence,” he said.

Paradyn uses a three-stage ‘gap analysis framework’ derived from the CIS Controls, during which it reviews clients’ IT infrastructure estate in order to chart the gaps in not only systems, but also processes and policies.

Casey said that the question of people and processes was too often ignored: “You do need the server guys, you do need the firewall people, but you also need to get the business processes right.”

Of course, with remote working the question of processes becomes even more urgent.

“If you look back ten years ago, what were you securing? You had on-premise users and an on-premise e-mail server, and possibly an on-premise database server. Now you have cloud to manage, possibly multiple ones, plus people all over the place, then the CEO comes down and says they want Outlook Anywhere or Office 365,” he said.

From inventory and control of hardware and software assets up to penetration testing, the right controls help protect organisations, and they also enable compliance with measures such as GDPR.

GDPR, though, is not the be all and end all of data, and issues such as intellectual property should be in the frame.

“GDPR is good, as it brought great emphasis on data, [however], the thing that I talk to companies about is that GDPR is concerned about PII [personally identifying information], but there’s more to data than PII. A lot of organisations put a lot of work into GDPR compliance, but it stops there,” Casey said.

“Cybersecurity is not just three things, it’s a thousand small things,” he said.

Click here to discuss your security requirements in more detail.