Higher risk means better strategies needed

SECURITY

|
Image: By BiztechAfrica
Higher risk means better strategies needed

Information is the lifeblood of business. Valuable corporate data is available to employees, business partners and contractors. It is accessed locally, in the cloud and virtual environments, providing instant access to non-public sensitive information. Making matters worse, employees typically do not ask permission to load third-party software or applications on their laptops and mobile phones, devices that are connected to their companies' networks and data stores.

The convenience and business value of "information anywhere" comes with risk. While companies want to support devices, software and applications that enable employees to get the job done, they must do so while carefully monitoring and managing business risks related to the use of information and IT.

“One solution is information security everywhere, but this is impractical and unachievable. Organisations need to determine when convenience results in too much risk and what should be done to limit risks. This is a major challenge, especially when you consider that most organisations cannot answer the simple question, ‘What is our information risk today?’” says Bruce Goodwill, Sales Director – EMEA, LATAM and Australia at AVG.

A good place to start, he says, is to treat online security the same way that businesses treat corporate governance and brand protection, and make it a boardroom issue. “This is not just a technology debate,” he points out. In addition, companies should protect, and keep protection updated for all computers and mobile computing devices that are brought in or taken home by staff, contractors, clients and visitors. Another measure is to promote strong password management, with password and username combinations that are not easy to guess and which include a combination of letters and numbers.

“Many businesses assume that because they have security software installed on their PCs, they are protected. However, the threat landscape is growing exponentially. In addition to increasing malware attacks via the Web, companies need to be wary of mobile devices that connect to their networks, and the risks posed by social networks and disgruntled employees. In order to manage this, organisations should begin by defining the business risk from the top down and then prioritising them,” Goodwill says.

As a basis, an effective security software suite will keep the bulk of threats at bay on a company’s PCs and laptops. Some, like AVG Internet Security, provide additional defences against attacks via social networks through products like Linkscanner and Online Shield. This also applies to security software for mobile devices. Goodwill points out that with the number of mobile devices entering company networks today, mobile security software has become as essential as PC and server protection.



Share the News

Get Daily Newsletter

Search News

comments powered by Disqus

MORE SECURITY NEWS

F5 introduces standalone security products to defend against targeted attacks

F5 DDoS Hybrid Defender provides superior infrastructure protection by combining multilayered DDoS defence across network, session, and application layers. Read More

Ethical Hacking students can’t get a heck of a job

Botswana ethical hacking students report that they are failing to break into the local job market.  Read More

Pokémon GO: Sophos warns against malicious copycats

Researchers at IT security company Sophos have warned mobile users to be cautious when downloading augmented reality (AR) mobile games. Read More

New PCI multifactor authentication rules: Is it too late?

Anton Jacobsz, MD at Networks Unlimited The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data.   Read More

Web apps, a leading cause of security breaches

Anton Jacobsz, MD at Networks Unlimited Web applications are the leading cause of security incidents for financial services, according to the 2016 Verizon Data Breach Investigation Report; this is up from 31 percent from last year’s report.  Read More

Analyst firm Ovum publishes SWOT analysis of Arbor Networks Spectrum v2.1

Arbor Networks has announced that leading global telecoms analyst firm, Ovum, had published a strengths, weaknesses, opportunities and threats (SWOT) analysis of version 2.1 of Arbor Networks Spectrum. Read More

New RSA Via solution innovations strengthen identity assurance and governance

RSA, The Security Division of EMC, has announced new, innovative identity assurance and identity governance capabilities in RSA Via, designed to help organisations effectively balance security and user convenience as they assure identities and better govern and manage privileged access.  Read More

Study affirms the DDoS challenge

The threat of DDoS is becoming ever more ubiquitous and attackers continue to ramp up in both scale and frequency. Read More

The sum of details at hand equals the quality of a cyber threat investigation

Anton Jacobsz, MD at Networks Unlimited Just like any detective investigating a crime scene, security analysts need to be able to access all the information pertaining to any threat incident they are investigating.  Read More

ATM/card-related frauds rise 11.95%

Fraud cases perpetrated through the use of automated teller machine (ATM) and other card payment system has risen 11.95% over last year’s cases, according to the Nigeria Deposit Insurance Corporation (NDIC) annual report. Read More

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor NetworksEricssonTigo Ghana

FEATURED STORY

First-ever Africa Barclays Accelerator programme concludesFirst-ever Africa Barclays Accelerator programme concludes

Ten fintech companies have concluded the first-ever Barclays Accelerator, powered by Techstars in Africa.

 

IN DEPTH

Ethical Hacking students can’t get a heck of a jobEthical Hacking students can’t get a heck of a job

Botswana ethical hacking students report that they are failing to break into the local job market.