Import substitution in cybersecurity: what awaits us when everyone leaves

The issue of digital data security was first raised globally in 1988 after the computer epidemic.

virus created by Robert Morris andlaunched at MIT, which led to massive infection of computers on the ARPANET. Since then, November 30 is celebrated as International Data Protection Day.  

In 2022, the number of cyber attacks on the internal systems of many Russian companies increased significantly.  

Cybersecurity: what is it 

With the rise of cybercrime,cybersecurity is a set of measures that includes both organizational measures and means to protect infrastructure, critical internal systems, networks and applications from external threats. And this is an activity that all organizations, regardless of their shape or size, should engage in. 

Information permeates our entire lives.Any action is associated with it: we leave data when making an appointment with a doctor, ordering food delivery or paying for services. Businesses suffer the most from cyber attacks. Criminals can take down servers and entire infrastructure by hacking into networks, download data, and then sell the stolen information or personal data. 

How did the remote 

By increasing the level of cybersecurity, manyRussian companies became concerned long before this year. With the transfer of employees to remote work, more data leaks began to occur. Accordingly, information security services needed to not only provide digital tools for remote employment, but also somehow protect internal resources.  

The relevance of this problem is only growing, sinceOrganizations are becoming more mobile and criminals are becoming more sophisticated. This leads to an increase in the number of potential cyber threats and risks. Currently, in the same banking structures and insurance companies, the focus has shifted towards external attacks, especially from abroad. 

Depending on the size of the company this workcould become truly large-scale. For example, SberStrakhovanie Life Insurance has installed protection along the perimeter of the entire structure: critical vulnerabilities in software are centrally controlled and DDoS attacks are being countered.

Three pillars of data protection 

The priority tasks in data protection include: 

  • Confidentiality - safety of customer data, it remains in the internal system and is not transferred anywhere.  
  • Integrity - the received information remains unchanged.  
  • Availability - all servers and all infrastructurework around the clock, 24/7, and are maintained by automated systems ensuring fault tolerance. This is mainly solved by organizing a geo-distributed backup data center and backup system. 

  

All this ensures the stability of the work of allservices of the company even in case of some global failures. This prevents the loss of information as a result of a cyber attack or other external influence.

Vector on import substitution 

Many developers left Russia this yearinformation security systems and electronics suppliers. On the one hand, this complicated the work of technical services, on the other, it opened up a wide field for the activities of domestic IT companies.  

The situation is more complicated for enterprisesbelonging to the list of strategic and system-forming ones, as well as being subjects of the critical information infrastructure of the Russian Federation. Additional measures to ensure their information security are established by Decree of the President of the Russian Federation No. 250 dated May 1, 2022. 

The document, in particular, states that already from 1January 2025, such organizations are expressly prohibited from using information security tools whose countries of origin are foreign states unfriendly to Russia.  

Compliance with the requirements of this decree inSberInsurance has a whole division involved in it. Already, all major systems are internal developments. They are carried out in-house in compliance with all cybersecurity requirements for production processes. 

As for the forecast for the development of the situation,It seems that in the next few years there will be a strong focus on exclusively domestic cybersecurity protections. This will be where the greatest focus will be placed. This makes the area one of the most attractive for investment. 

Read more:

Scientists from the permafrost zone: how they develop smart clothes and a cancer vaccine

Scientists "cheated" time and sent a photon into the past: how this breakthrough will change physics

10 scientific facts that turned out to be fakes. Cards