CIO Wall

Husna Zaman Al Hadi

General Manager and Head - IT - Edison Group - Bangladesh

CIO Perspectives

The Pandemic triggered digital and remote working making Cyber Security one of the top priorities for organizations. In this context, tell us briefly how your organization managed the transition to remote working during the pandemic? How did you manage employees logging into the corporate network or accessing critical resources and remain protected from cyber-attacks? Tell us about some of the unique security best practices that you have implemented to protect your organization against cyber-attacks?

Many organizations struggled to thrive when COVID-19 pandemic hit the world back in early 2020 which forced employees to do home office. Remote working is now a new norm and business transformation with it. To keep the business running in a pandemic situation, here at EDISON Group, we have facilitated secure VPN technology through firewall for all employees. Using the VPN facility employees accessed internal network and resources remotely. We secured all endpoints with EDR solution so that even while workforces are working from home; their workstations stay secured. Applications and infrastructure are very much connected now-a-days. It’s important to view the whole picture and plan security accordingly. My suggestion is to use secure VPN facility with Managed Detection & Response (MDR) & Cloud-based Firewall to facilitate employees to work remotely.

While everyone is busy fighting against the pandemic, there is another unseen threat rising in the digital world; the cyberattacks. Hackers are continuously launching new attacks using innovative methods and organizations are experiencing difficulty in handling them. As financial applications data is the prime target, here at EDISON Group, we have taken series of actions to make it secure. Enhancing password policy is a good first step as employees are working remotely. We ensure use of complex password & regular change of it. Employees are the first line of defense. We make them aware of how to keep themselves safe against cyber-risk which has proved to be beneficial for us. Investing on infrastructure security visualization, applications & Email security tools helps us to minimize the risk. Implementing port-based security on firewall & separating reporting panel from internet facing applications has helped us to secure business critical data from data leakage.