People still write passwords down in notebooks and post-it notes.
MEDIA 7: With 17 years of experience in cybersecurity and research, what was the inspiration behind founding Jenny?
TINESH CHHAYA: The real inspiration came from wanting to support users from within the cyber market, and outside of it, to help them make trusted and informed decisions on cyber security providers before they are bought, invested, or partnered with these companies. I wanted to build trust between users and suppliers, provide assurance and also have clarity on the information provided by the suppliers. Jenny is able to provide this, and with speed.
M7: You are four weeks away from launching Jenny V.2! Could you please shed some light on some of the latest developments on this SaaS Cyber Business Intelligence Platform?
TC: Jenny V.1 focused on the marketing information provided by the vendor and only that. Jenny 2.0 re-enters into the market as a Cyber Business Intelligence Platform that offers a complete 360° view of security suppliers such as information on financials, the security posture of the supplier including Threat Intelligence, Third-party Risk assurance, employee information, third party review taken from global review companies, all supplier social media content and dive deep into the company collecting over 30 data points on the company, therefore providing a complete view on that supplier and allowing trust to be built easier with users.
Read More: Shaun Clark of HighLevel believes in pairing Artificial Intelligence with People Engagement
From a cyber perspective, the industry needs to ensure that the movement of digital information is regulated and monitored, protection is put in place for unauthorized access, which in turn would allow for confidentiality.
M7: How does Jenny help businesses find cybersecurity products and services that are right for them?
TC: Jenny is like a search engine for information on security vendors. As we gather, organize, and categorize with supervised machine learning capabilities, Jenny enriches vendor information with critical profile data in near real-time. Our library science approach makes searching and analyzing vendors and service providers easier, and more natural. There is also human involvement whereby we contact the suppliers and further validate the information that Jenny has found along with asking them to furnish us with relevant information via an onboarding process.
M7: With a growing need for digital transformations, what are some of the biggest cybersecurity risks plaguing the industry?
TC: From a cyber perspective, the industry needs to ensure that the movement of digital information is regulated and monitored, protection is put in place for unauthorized access, which in turn would allow for confidentiality. Internal security systems, security control, and technology integrity hardening would be key. Ensuring that security controls such as application vulnerability management, network security, and security monitoring would need to be considered as an organization moves along any sort of digital journey.
Read More: 'Blockchain technology's mass adoption problem can be solved by a multi-framework platform and interconnected environments' believes Yifan He
If a ransomware attack happened, you would be in serious trouble if all your data was gone in an instant.
M7: According to you, what are some of the best approaches that enterprises can adopt to improve the protection of their data in hybrid and remote working environments?
TC: This is something that every enterprise has had to adapt and put into place since COVID-19 hit us all. For us, we started with some basics, such as enabling 2FA right across the teams to ensure we tighten up over the usual username and password efforts. Soon after, we spent time educating the teams to look out for suspicious emails, messages, and anything out of the ordinary. The main thing was for the employees to stop, think and alert our IT team if they have any concern at all before opening or pressing forward on an email, paying an invoice request from me, or even knowing who they are connecting to and through over an open WiFi network. We also asked staff to change passwords regularly which is easier said than done. People still write passwords down in notebooks and post-it notes. As a company, we back up every 15 mins, however, many companies don’t back up at all. If a ransomware attack happened, you would be in serious trouble if all your data was gone in an instant. Finally, we employ a lot of young people, and they like the freedom to be able to work flexibly and without any restrictions, so we have a rule - that they use their work devices responsibly and over lunch and breaks for personal things.
M7: What are some of the different ways enterprises can utilize AI to drive large-scale shifts towards sustainability in their business models?
TC: For us, Jenny helps reduce the carbon footprint. With over 9000 security global vendors, you can imagine that even with on a functional level, such as sales for example, the amount of travel each year from a client on each site leads to a lot of fuel being used. We are one of many AI-driven companies that are powered and provide our services through online, so as a collective, you can only imagine how much fuel we could save.