Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business Resilience

A new resolution: Course-correct any rushed pandemic-driven decisions

By JP Perez-Etchegoyen
evaluate your cyber best practices
March 25, 2021

In 2020, organizations fast-tracked digital transformation initiatives and cloud migrations to provide remote capabilities to employees, customers, and overall processes hampered by the pandemic. It’s safe to say many of these prioritized decisions were put forth by organizations that didn’t perform a proper threat analysis or weren’t aware of the potential risks they were introducing to their company. As a New Year’s resolution, it’s imperative for all 2020 digital transformation initiatives to be revisited and course corrected. This includes double-checking any rushed decisions by performing proper risk assessments, reassessing interconnected cloud applications, reexamining access controls to third party applications, and tightening up outstanding misconfigurations and patches.

Perform a proper risk assessment

All Chief Information Security Officers and cybersecurity leaders should perform a full risk assessment before introducing any new processes or changes to existing processes. Still, with the urgency of speedy digital initiatives caused by the pandemic, it’s understandable that time was not of the essence. In 2021, organizations should take a step back and revisit changes with a proper risk assessment. This assessment should identify all critical changed systems that access sensitive data, recognize any potential threats created by the change, and determine the inherent risk and overall impact. Once the risk assessment is performed, security teams should partner with IT and other stakeholders to inspect the environment and put the proper threat prevention, detection and mitigation solutions in place.

Reassess interconnected cloud applications

The most popular digital transformation initiative of 2020 was the rush to the cloud. Cloud migrations and SaaS adoption skyrocketed during the pandemic, with companies relying on the flexibility of cloud-based platforms and tools to increase productivity regardless of an employee’s location. In the first quarter of 2020 alone, PwC reported that cloud spending rose 37% to $29 billion and predicts this trend to persist.

New interconnected cloud apps added hastily during the onset of the pandemic should be reassessed in 2021 as companies may have lost visibility into the risk of their interconnected systems and application environments. One misconfigured system or security vulnerability can put the entire enterprise at risk. Organizations need to reevaluate which applications support critical business processes and how they interconnect with each other. As remote workforces become a long-term reality, these seemingly minor mishaps could jeopardize the integrity of the organization, so gaining control and understanding of configurations is critical.

Reexamine third party-applications

A vital question organizations should reexamine in 2021 is “Which third-party applications have access to sensitive data?” Authorization and access control are some of the basic building blocks of risk management and internal controls for a business, but third-parties can introduce a potential threat to companies’ customer data, financial information and operations by having access to privileged systems. In fact, according to a Gartner survey more than half of respondents are concerned about third-party cybersecurity risk since the onset of the pandemic.

Emerging best practices to streamline how enterprise security leaders can mitigate third-party risks include reviewing third-party compliance activities such as privacy and security training plans and updating contracts to include clauses intended to mitigate cybersecurity & data privacy risks. Organizations can also streamline third-party due diligence by identifying and prioritizing critical third parties and helping them manage risk throughout.

Fix outstanding misconfigurations & prioritize patches

Misconfiguration mistakes continue to be the root cause of the majority of data breaches. It’s reasonable to accept that, in 2020, while security and IT teams were spread thin, misconfigurations likely occurred, and patches may have been missed. In 2021, there should be an urgency for developers and IT teams alike to revisit new custom code and fix any misconfigurations while cross checking published patches to ensure they’ve been resolved. Organizations should always establish and follow patch management procedures to safeguard their enterprises from cyberattacks, placing priority on security patches is critical for protecting devices and data. Thankfully, the recent 2020 Verizon Data Breach Report found that less than 5% of breaches involved exploitation of a vulnerability which suggests that most companies are doing a good job at patching.

If security is prioritized, the rushed digital transformation initiatives from last year present a positive outlook for the technology industry. As a resolution in 2021, organizations should take a step back and ask, “did we do this correctly?” and “is everything managed properly?” These initiatives usually take longer to deploy, so it’s fair to assume that the rushed digital transformation decisions may not have been made at the right pace, or with the right preparation. Performing a proper analysis of the threat landscape, reassessing interconnected cloud applications that access data, checking in on third-party applications accessed by partners and customers, while also double checking any misconfiguration mistakes, will help ensure sound security within all areas of the enterprise in 2021 and beyond.

KEYWORDS: business resilience business resilience planning cyber security cybersecurity preparedness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

JP Perez-Etchegoyen is CTO of Onapsis.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Women in security working

    Data-driven decisions in the SOC

    See More
  • The Corner Office - july 2018

    Looking for a New Year’s Cyber Resolution? Perpetual Vigilance

    See More
  • Cyber data breach

    Online Privacy During a Pandemic: New Challenges in a New World

    See More

Related Products

See More Products
  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing