top of page
  • Satellite Evolution

New report from WTA, “Making Cybersecurity Pay Off” provides key guidance for security decision maki

New report from WTA, “Making Cybersecurity Pay Off” provides key guidance for security decision making

The World Teleport Association (WTA) today released Making Cybersecurity Pay Off, the first in a series of new reports, that calls on cybersecurity experts in Europe, Asia and the United States for guidance on making smart decisions. The report provides recommendations for taking charge of cybersecurity and achieving the best return on investment in protecting the operating teleport. “The people in your company who have to make decisions about paying for cybersecurity probably don’t know what they’re buying,” said executive director Robert Bell. “In a cybersecurity discussion, the principles quickly give way to mind-numbing details about SQL injection, cross-site scripting and phishing that only IT people can grasp. Midsize-to-small teleport operators are under-prepared for cyberthreats because few business owners want to buy something they don’t understand.” The report is available to WTA members only. They can access the report by signing in to their accounts on the WTA website. WTA Members may directly download the report by following this link. More about Making Cybersecurity Pay Off [if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"> <v:stroke joinstyle="miter"></v:stroke> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"></v:f> <v:f eqn="sum @0 1 0"></v:f> <v:f eqn="sum 0 0 @1"></v:f> <v:f eqn="prod @2 1 2"></v:f> <v:f eqn="prod @3 21600 pixelWidth"></v:f> <v:f eqn="prod @3 21600 pixelHeight"></v:f> <v:f eqn="sum @0 0 1"></v:f> <v:f eqn="prod @6 1 2"></v:f> <v:f eqn="prod @7 21600 pixelWidth"></v:f> <v:f eqn="sum @8 21600 0"></v:f> <v:f eqn="prod @7 21600 pixelHeight"></v:f> <v:f eqn="sum @10 21600 0"></v:f> </v:formulas> <v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"></v:path> <o:lock v:ext="edit" aspectratio="t"></o:lock> </v:shapetype><v:shape id="_x0000_s1026" type="#_x0000_t75" alt="Image removed by sender." href=";id=a5dcdab318&amp;e=8d858155aa" style='position:absolute;margin-left:62.05pt;margin-top:0;width:113.25pt; height:146.25pt;z-index:251658240;mso-wrap-distance-left:0; mso-wrap-distance-top:0;mso-wrap-distance-right:0;mso-wrap-distance-bottom:0; mso-position-horizontal:right;mso-position-horizontal-relative:text; mso-position-vertical-relative:line' o:allowoverlap="f" o:button="t"> <v:imagedata src="file:///C:/Users/Laurence/AppData/Local/Temp/msohtmlclip1/01/clip_image001.jpg" o:title="image002.jpg@01D51D02"></v:imagedata> <w:wrap type="square"></w:wrap> </v:shape><![endif][if !vml][endif]Most companies that operate teleports are medium to small in size, both in revenues and headcount. And in cybersecurity, size seems to matter. The biggest teleport and satellite companies in the business have robust cybersecurity operations, led by a chief information security officer and enforced with detailed procedures, technology and training programs. The smaller the company, however, the more likely it is to be vulnerable, because protection against cyberattack is pushed low on the priority list by more urgent needs, like making payroll. Only when an attacker hits do the true costs of vulnerability become clear. The question for teleport executives is not “will we be attacked?” but “what will we do when we are?” Behind that question is another vital one: how do we make cybersecurity pay off? Like any other investment, you are looking for the best return on what you have to spend. This report provides guidance on making smart decisions in an area where the cost of vulnerability – whatever it actually may be – is climbing every year. [if !supportLineBreakNewLine] [endif]

bottom of page