Higher risk means better strategies needed

SECURITY

|
Image: By BiztechAfrica
Higher risk means better strategies needed

Information is the lifeblood of business. Valuable corporate data is available to employees, business partners and contractors. It is accessed locally, in the cloud and virtual environments, providing instant access to non-public sensitive information. Making matters worse, employees typically do not ask permission to load third-party software or applications on their laptops and mobile phones, devices that are connected to their companies' networks and data stores.

The convenience and business value of "information anywhere" comes with risk. While companies want to support devices, software and applications that enable employees to get the job done, they must do so while carefully monitoring and managing business risks related to the use of information and IT.

“One solution is information security everywhere, but this is impractical and unachievable. Organisations need to determine when convenience results in too much risk and what should be done to limit risks. This is a major challenge, especially when you consider that most organisations cannot answer the simple question, ‘What is our information risk today?’” says Bruce Goodwill, Sales Director – EMEA, LATAM and Australia at AVG.

A good place to start, he says, is to treat online security the same way that businesses treat corporate governance and brand protection, and make it a boardroom issue. “This is not just a technology debate,” he points out. In addition, companies should protect, and keep protection updated for all computers and mobile computing devices that are brought in or taken home by staff, contractors, clients and visitors. Another measure is to promote strong password management, with password and username combinations that are not easy to guess and which include a combination of letters and numbers.

“Many businesses assume that because they have security software installed on their PCs, they are protected. However, the threat landscape is growing exponentially. In addition to increasing malware attacks via the Web, companies need to be wary of mobile devices that connect to their networks, and the risks posed by social networks and disgruntled employees. In order to manage this, organisations should begin by defining the business risk from the top down and then prioritising them,” Goodwill says.

As a basis, an effective security software suite will keep the bulk of threats at bay on a company’s PCs and laptops. Some, like AVG Internet Security, provide additional defences against attacks via social networks through products like Linkscanner and Online Shield. This also applies to security software for mobile devices. Goodwill points out that with the number of mobile devices entering company networks today, mobile security software has become as essential as PC and server protection.



Share the News

Get Daily Newsletter

comments powered by Disqus

MORE SECURITY NEWS

Ransomware: don’t pay the cybercriminals

ESET offers tips on how keep PCs protected and avoid supporting cybercrime activities. Read More

Data breaches to cost $2.1 trillion by 2019

New research suggests that the rapid digitisation of consumers’ lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019. Read More

Betting the farm on untested tech

While a plethora of new payment solutions are coming to market, businesses should be cautious about moving to new solutions just for the sake of it. Read More

Mobile student ID system to authenticate over 2 million Nigerian students

HID Global and Botosoft have built and delivered a system to help the West African Examinations Council (WAEC) register and authenticate Nigerian students. Read More

‘WD purple surveillance drives tackle security challenges’

Western Digital has released one of its flagship products, purple surveillance storage drives (WD Purple), in Nigeria, saying the solution, designed for high definition (HD) surveillance, will help tackle insecurity. Read More

Malawi Veep to lead in cyber security meeting

Malawi’s Vice President Saulos Chilima will next week preside over a sensitisation workshop on Cyber Security organised by the Malawi Communications Regulatory Authority (Macra) in collaboration with the Common Market for Eastern and Southern Africa (Comesa). Read More

Fighting the insider threat

There has been a growing focus on the threats posed by company employees who have access to critical information and either maliciously or carelessly leak that data, says Phoenix Software. Read More

Zambia to host Southern African Banking and ICT Summit 2015

Efforts to curb increased incidences of cyber crime within Africa’s financial institutions, Government Agencies and private sector have received a boost with the planned Southern Africa Banking and ICT Summit set for April, 30th , 2015 at Intercontinental Hotel Lusaka Zambia. Read More

E-PPAN alerts bank customers on fraudsters

With many bank customers that use the electronic payments falling prey to fraudsters, Electronic Payments Providers Association of Nigeria (E-PPAN) has warned customers to be wary of how they release the details of their bank accounts to people. Read More

TESPOK, Kenyan government monitoring cybercrime

The Telecommunications Service Providers Association of Kenya (TESPOK) and the government are monitoring and collecting data on cybercrime on the country’s networks in a bid to tackle the growing problem. Read More

PRESS OFFICES

Sage ERP AfricaSAP AfricaSage Pastel AccountingTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4Afrika

FEATURED STORY

The transformative power of affordable smartphones and unlimited data in GhanaThe transformative power of affordable smartphones and unlimited data in Ghana

Smartphones are helping transform their lives of ordinary people in Ghana, Reports Nana Appiah Acquaye.

IN DEPTH

NIMC infrastructure must be managed by credible people: NIMC chiefNIMC infrastructure must be managed by credible people: NIMC chief

NIMC’s chief speaks to Kokumo Goodie about the role of the NIMC and his own legacy.