Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Halftime’s Over! New Cyber Security Ideas for the Second Half of 2016

Oscar Marquez | June 27, 2016

This vendor-written piece has been edited by Executive Networks Media to eliminate product promotion, but readers should note it will likely favour the submitter's approach.

In the last 5 years, businesses of all sizes have realized just how vulnerable they are to cyber-attacks.

The astonishingly increasing number of attacks each year trouble corporate heads so much that they spend hours on end discussing their company's cyber security system. The IT professionals and Chief Information Security Officers (CISOs) are even more troubled, for they keep seeing their efforts foiled by hackers.

The number of large corporations targeted in 2015, and so far in 2016, only goes to show that no one is completely safe. Wherever you look, there is an Ashley Madison data breach or a Home Depot or JP Morgan Chase story from the past year that will make you realize just how precarious security structures are.

In sports, teams regroup at halftime and get back to work in the second half with a refocused goal of finishing the game strong. The same holds true for security practices. To help corporations beef up their security better in the second half of 2016, here are some fresh ideas to keep your data safe:

  •  Be Aware of Stored Data
  •  Focus on Protecting Data
  • Address the Mobile Threat
  • Spread Awareness
  • Take Insider Threats Seriously

It is quite astonishing how many big firms do not have any idea what huge chunks of data in their systems are about. Technologies such as the Internet of Things (IoT) have a lot to contribute to this, but company data should be handled better. One must at least know what is stored in their systems. That would provide them an idea as to what data is of the most priority and what needs to be protected most against threats.

The most infamous cases of 2015 related to data breaches of global services and corporations. Yet, corporations think that beefing up their firewalls and security perimeters is the answer to such attacks. They couldn't be less accurate. Attacks like these go to show that protecting your data is the main priority. Encrypting different clusters of data with secure mechanisms is vital to prevent data from being compromised easily should unauthorized personnel make it into corporate network.

Many corporations use the idea of Bring Your Own Device (BYOD), allowing employees to use their personal device in the workplace. It is always safe to assume that most employees do not take the necessary security measures for their mobile devices. This invariably puts corporate data on such devices at great risk. IT admins need to have better control over such devices. They need not have more control, but better control.

It is never a bad time to spread awareness among employees, however small or high ranking they are, about the different threats they face. Ignorance should never be doubted or disregarded, for it is always present around you. Interacting with employees regularly about the different threats present and sharing ideas about improving security are good practises.


1  2  Next Page 

Sign up for Computerworld eNewsletters.