Keeping your organisation secure at the edge2 min read


As remote working continues to expand the perimeter of attack surfaces, it is a good time to consider the benefits of edge computing – and how to ensure that your edge is secure.

Edge computing refers to the devices that are connected to the network at the “edge,” or, essentially, those not located within a centralised authority. They can be connected to the main data centre, but they can collect and process independently. This decentralised model has been hailed for its lower latency times, which is key to emerging technologies across industries, including autonomous vehicles and IoT. While this allows for some exciting advancements, the proliferation of devices inherently increases the points of entry into a network. If not managed correctly, this could create serious issues for these sensitive networks.

Without an accurate picture of all of the devices and third parties, businesses are left with gaping blind spots in their cybersecurity strategy. However, there are several steps organisations can take to manage the increased risk that edge computing brings.

Risk assessments. Organisations should regularly perform risk assessments, comparing the risks of edge computing to a more traditional model. There should also be scrutiny given to the business benefits of implementing edge computing, and consideration to what extent an organisation would like to depend on devices at the edge.

Consistently review and update cybersecurity policies. Building upon the risk assessments, organisations should incorporate their learnings into the cybersecurity strategy, ensuring the effective management of common or high-risk threats. This should include both cyber and physical threats.

Use network segmentation and zero-trust policies. Separating key devices or networks or switching to a zero-trust model can go a long way to protecting an organisation. This ensures that even if one device or network area is compromised, it can be contained and managed quickly and separately.

Consistently monitor threats and adjust accordingly. Using tools like CyDesk, security teams should monitor a variety of sources for threat intelligence, ensuring that their cybersecurity plan is adequately prepared to deal with emerging threats.

As edge computing continues to develop, organisations will have to adapt their cybersecurity strategies to protect themselves. Remote working and other use cases means that devices on the edge will only proliferate, so businesses should make sure that they are prepared for this next wave of digital transformation.

United Kingdom

+44 020 3190 5000

The Rain Cloud Victoria
76 Vincent Square
London, SW1P 2PD

The Netherlands

Oude Udenseweg 29
5405 PD Uden
The Netherlands

Newsletter Signup

%d bloggers like this: