Securing Media Content for a Multi Platform

By Enterprise Security Magazine | Friday, November 30, 2018

Media ContentThe quality, reliability, and the uniqueness of the broadcaster’s or the programmer’s content are of the utmost importance in the media domain. However, recent cyber attacks across industries have caused the leakage of confidential data, resulted in the loss of millions of dollars, and created numerous legal, regulatory, and reputational risks. In the case of media companies, a cyber attack can halt their operations on their tracks, which include slowing the performance of content, disrupt services across all platforms while providing another outlet to hackers to pilfer unique and engaging content. While there is no ‘magic wand’ that would prevent a security breach, the security posture can be significantly improved by addressing some basic issues.

Media companies need to rethink their security posture that aligns with the current trends in cloud-based streaming and linear programming. The scope for programmers to contribute and for customers to obtain content has paved the way for malicious hackers to steal or disrupt content. To this end, every point across the distribution cycle needs to be assessed, tested, and secured. For a multi-platform media, layered controls are needed to establish proactive security that limits opportunities for content and other data to be compromised, at the ground level.

With the rapidly changing broadcast, data, telecommunications, and cloud technology; media companies can’t rely on a single, best measure of security for any one point. Therefore, multiple layers of security is the need of the hour as it makes breaching the system, relatively difficult for someone with a malicious intent while giving the organization’s team time to detect and respond before any data is compromised. The best approach is developing a pervasive security framework, which includes layered controls, a compliance programme, extensive audit, and assessment initiatives, with a coordinated incident process.

Even after securing and deploying layered security measures, the content remains at risk if the company’s partners do not follow best practices and are not transparent in their security posture. It needs to be ensured that each partner in a media company’s ecosystem has the right security requirements in place that are communicated regularly to keep up with the threat environment and maintain security starting from the ground level.

A security breach, nowadays, is a common occurrence but what prevents an incident from becoming a significant breach and distinguishes a major cyber-security programme is how quickly a team responds. A quick assessment of the situation and mitigating the threat is critical to the life-cycle operations of broadcast and communications services.

Relying solely on internal security reviews is not a wise choice as cyber security is too complex and disruptive. It may happen that even the best internal cyber-security professionals can miss out on threats that another team can identify. In order to find the gaps in their system, which are often overlooked, broadcasters require a third-party view. There’s no miracle waiting to happen for broadcast security but some concrete steps can help protect media content.

Weekly Brief