Cyber Resilience : Providing Trust System Solutions
- Par LIENGU ETAKA ESONG
- 20 janv. 2025 16:53
- 0 Likes
This was during a training to equip companies, especially banks, on how to build resilience and recover from cybersecurity attacks.
On a daily basis, data systems of companies and banks are hacked and sometimes sensitive information is found in the possession of hackers, putting the company or bank and customers at risk. As more strategies are developed to fight against cyber security attacks and data system protection, hackers are also developing new and sophisticated strategies to hack and penetrate the systems.
It is against this backdrop that Trust System Cameroon organized a training on December 12, 2024 for businesses, especially banks, on how to build resilience. During the training, one of the experts from Senegal, Youssoupha Guedel Ndiaye, explained that it's important to have a mechanism like an imitable copy for data that can't be deleted or modified by anyone.
"The next step is to have the air gap, which is the mechanism to isolate your copy and make sure that those copies are invisible to anyone in the organization or even externally. Because some of the attacks are happening internally. So those copies have to be invisible, that is what we call the air gap,” Youssoupha Guedel Ndiaye revealed.
He made the companies and banks present understand that there is also the possibility to always scan their copies to check if they are infected or not. In addition. He continued, "We must have a mechanism to restore these copies as quickly as possible. All the strategies are in line with international standards such as the National Institute of Standard of Technology NIST," he concluded.
For his part, Ibrahima Cherif, IBM Certified Advanced Technical Expert and Open Group Master Certified Technical Specialist from Guinea, explained that cybersecurity is how to protect a company from cybersecurity attacks, adding that a company can't guarantee 100% cybersecurity. As a result, they introduced cyber resilience, which is how to recover faster after a cyber-security attack.
He revealed that "The IBM Defender that we are introducing is a package of different solutions that are put in place in other to recover our data after an attack as fast as possible. We have some strategies of international standards like the National Institute of Standard of Technology - NIST on which we base our solutions. We have some mechanisms that we put in place to protect that...
Cet article complet est réservé aux abonnés
Déjà abonné ? Identifiez-vous >
Accédez en illimité à Cameroon Tribune Digital à partir de 26250 FCFA
Je M'abonne1 minute suffit pour vous abonner à Cameroon Tribune Digital !
- Votre numéro spécial cameroon-tribune en version numérique
- Des encarts
- Des appels d'offres exclusives
- D'avant-première (accès 24h avant la publication)
- Des éditions consultables sur tous supports (smartphone, tablettes, PC)
Commentaires