Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 16 May, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Security inside out

by The Gurus
October 1, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

As summer comes to a close, there will undoubtedly have been an increase in the number of people taking time off to holiday.
This would have led to the familiar rush to complete work, an increase in the number of staff working remotely, and, for an unlucky few, even taking the laptop on holiday with them.
For many organisations this will have increased the risks typically associated with corporate data and sensitive information on the move, and businesses will have reduced control over the security of their data.
With the flexibility of being able to work remotely from almost anywhere, businesses are required to trust their employees and rely on them taking the right precautions to keep sensitive information secure.
Whilst many organisations are prepared for security attacks with processes in place to ensure security on their own systems, few employers expect their loyal employees to steal company data.
 
Life on the inside
Following the Edward Snowden revelations in 2013, IT departments are now tasked with monitoring and awareness of potential insider threats. Though Edward Snowden’s work with the CIA and other US intelligence agencies put him in the position of a highly trusted employee, this trust provided him with everything he needed to accomplish what he set out to do. There were no measures in place to stop him and prevent what was quite possibly the biggest information leak in the history of the US.
The risks come from those that intentionally misuse their access to data and use it to cause a negative and detrimental impact on the confidentiality and integrity of sensitive information.
 
Data lock down
Whilst there are a number of obvious routes to secure intellectual property, if the authorities from whom Snowden was stealing had a managed and encrypted flash drive, they could have tracked the information wherever it resided. Any activity on the drive could have been monitored from an on-premise or cloud-based management service. This would have ensured that they would have had constant contact with it, and would have had the ability to restrict where the device could be used, or simply resort to the fail safe and remotely lock it down, ensuring nobody could access the data.
If data isn’t encrypted, its integrity can easily and quickly be compromised. Being able to manage and track it, knowing who’s accessed it, from what location, and on what devices that information resides, is essential. Whilst this can be difficult across a fragmented IT environment, companies need to be confident that if a device is considered to be compromised, they can remotely lock it down, wipe it, or initiate a self-destruct sequence to remove the data to protect themselves and their stakeholders.
Protecting sensitive information and intellectual property, be it from malicious or disgruntled employee’s stealing data, or those unintentionally violating data use policies, should be a priority for all organisations.
How many of your employees would you expect to steal from you? Hopefully the answer is none? What if you ask yourself how many have the ability? A much larger number, perhaps? The truth is that anyone in your company has the capability to steal, share or sell restricted information, so you need to be prepared for any eventuality.
 
 
Nick Banks is vice president of EMEA and APAC at Imation Ironkey Solutions

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

New patches issued for Shellshock flaw

Next Post

Christopher Young to lead Intel Security

Recent News

eu flag

EU announces provisional cybersecurity directive

May 16, 2022
man looking sad

Security pros say their mental health has declined

May 13, 2022
@ symbol

NCSC launches free email security check

May 12, 2022
warning colours

Five Eyes urges organisations to secure supply chains

May 12, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information