Citrix Blogs

3 cybersecurity checklist items to consider in 2022

The total value of ransomware-related payments in just the first six months of 2021 ($590 million) exceeded all of 2020 ($416 million). Yet, even with the increasing impact of cyberattacks, 90 percent of security leaders still believe they’re falling short in addressing cyber risk.

We can do more in 2022 to protect ourselves through a robust cybersecurity posture. And In my opinion, the operative word here is “posture.”

A robust cybersecurity posture certainly isn’t a clunky, mishmash of poorly integrated, multi-vendor security products. Instead, it’s an always-on state wherein all your assets — every application, all data, and every device, across any network — are always protected in a manner that is agile and scalable for your IT team and frictionless for the end user. And at the center of it all is a new mindset — to remain vigilant and protected — that needs to be endorsed and applied by every employee in the organization.

While there is much work to be done for all organizations to adopt this posture, this is, by no means, a pipedream. In my conversations with InfoSec teams globally, many organizations have developed their cybersecurity roadmaps based on modern approaches and architectures. Let’s look at a short checklist of items I’d recommend. Do you have them on your 2022 agenda?

Checklist Item #1: Build cybersecurity into your organizational DNA

InfoSec teams, led by CIOs and CISOs, play a key role in educating organizational leadership that cybersecurity isn’t just a checkbox for compliance. Instead, it’s an opportunity to differentiate the business and build customer trust by protecting customer privacy. In today’s world, where breaches make the news, this matters.

To build this habit of security across the organization, employees outside the InfoSec team must also prioritize it. For instance, DevOps teams must build app and API security into their plans, versus leaving that as an afterthought. System admins should never use passwords like “Hello123”, “training,” or “Password1” (these were literally listed in the Conti ransomware playbook for brute force access). And everyone must limit recreational browsing to websites of repute, staying away from sites with questionable content. (Shlayer, one of the most prolific malware varieties in 2020, often spread through sites with pirated content.)

InfoSec teams can help build such cyber-hygiene habits with periodic employee education, phishing tests, app penetration tests, and web filtering with custom warning pages (to restrict access to potentially malicious websites, domain extensions and file extensions). Of course, cyber hygiene only supplements robust cybersecurity architectures. With increasing sophistication of attacks, the need for the latter has increased.

Checklist Item #2: Protect every employee, everywhere, all the time

“WFH culture” is here to stay. Enabling employees to work from anywhere requires ensuring they’re always protected. Unfortunately, traditional approaches of VPN-ing traffic through datacenter-based security stacks adds app latency. To remain productive, employees disconnect from VPNs when accessing internet and SaaS. The net result? They’re left unprotected.

Protecting remote workers requires security that’s frictionless — security that doesn’t even seem like it’s there so employees can work without interruption. This can be done by replacing traditional “VPN through the datacenter” architectures with a two-pronged approach:

Depending on your current needs, you might decide on bolstering the above approach with multi-layered protection that includes both endpoint and access security solutions, perhaps supplemented by an AI-driven analytics platform. It makes sense to brainstorm on what approach is most applicable for you. But however you design your architecture, its administration does not need to be complex; stronger security does not imply more complexity. In fact, it’s important to simplify administration for stronger security. More on that next.

Checklist Item #3: Simplify for stronger security

Every InfoSec team needs to execute threat hunts, red-blue team exercises, emergency procedure definition, internal audits, employee education, exploration of new technologies, and more (as if that wasn’t enough!). If your InfoSec team is sufficiently large to support all these functions, in addition to administration of multiple vendor solutions, then you might have the opportunity to pick vendors of choice and manually integrate them. This does come with the overhead of multiple consoles (i.e. blind spots), different update cycles, different licensing tiers, and more.

Given that 57 percent of organizations have been affected by a shortage in cybersecurity talent, with 38 percent stating that the skills shortage has led to employee burnout and employee attrition, we have seen a trend in the industry for vendor consolidation to simplify cybersecurity, without compromising effectiveness. Here are a few ideas:

While no one can predict what will happen in 2022, it’s clear that we must be ready for change — to evolve with new business requirements, new employee expectations, new cyber threats, new technologies, and everything in between. And that’s OK. After all, nobody ever got anywhere standing still. Happy holidays and have a prosperous 2022!


Did you know that Citrix has a comprehensive solution set for securing your business, from access to internet, SaaS, and internally managed apps, to the apps themselves? And if you’re still unsure about what you need, reach out to us for a conversation with our experts, and we can take it from there.

Exit mobile version