| |||||||||
| |||||||||
Current Filter: Network>>>>>Feature> Endpoint backup Editorial Type: Feature Date: 07-2015 Views: 2966 Key Topics: Networking Security Endpoint Security The Intenet of Things (IoT) Cloud Backup Malware Attacks Key Companies: Code42 Key Products: Key Industries: | |||
| A good endpoint defence is the best offence claims Andy Hardy, Managing Director EMEA at Code42, who explains his views on endpoint data security Gone are the days when corporate data was confined to an on premise data centre. Today's organisations are more mobile, adaptable and flexible than ever before. What does this mean for a company's data? In any enterprise, corporate information can be spread across thousands of devices ranging from desktops to smartphones. This increase in endpoint devices adds a huge amount of risk to locally stored data if it is not appropriately protected. From leaving a tablet on a train, to inadvertently downloading a piece of malware onto your work PC, the risk from external factors is significant and omnipresent.
WHAT IS LURKING IN THE SHADOWS? Looking forward, the Internet of Things (IoT) is creating millions of new IP addresses on an array of devices, all capable of transmitting data, and at the same time virtual desktop clients are sending sensitive information across the internet. Unless adequately protected, the enterprise will become even more porous and sensitive information could simply vanish.
NO PERIMETER HIGH ENOUGH Therefore, a comprehensive endpoint data security strategy is the best line of defence when it comes to the longevity and security of both important data and the network. Detecting threats is a vital element of this and it should be a mainstay of an organisation's security strategy. Security must be continuous, not an occasional audit. Automated, consistent backup is crucial to protect data on both the endpoint device and in the cloud. Businesses also need to be in full control of this data, especially in light of the recent data sovereignty debate in Europe. By utilising encryption at both ends of the chain and in-transit, the enterprise can have complete control and visibility of its information. Additionally, if only the company holds the encryption keys, any high-level requests for data access must go through them (versus for example, a cloud vendor), thus assuaging concerns over data sovereignty. A comprehensive endpoint security programme can take businesses beyond just detecting threats. Were a hacker to steal a mission-critical file from an endpoint device and then hold it to ransom, it now does not need to be a problem. The device can be wiped clean then restored to its status prior to attack. Similarly if a laptop is stolen, the entirety of the device can be mirrored to a new machine. In short, being hit by a malicious attack does not need to be a disaster. Data visibility and historical forensics for security professionals and IT teams should also be considered, so businesses can see who has (or had) access to a specific file or data set at any given time. This means shadow IT practises can be identified allowing the IT team to educate on the risks of data neglect and pinpoint attacks. An effective endpoint data security policy must employ adequate training, software and strategy to mitigate the risks of data loss and corruption. Appropriate backup really can back up the CISO and IT department when it comes to securing network endpoint devices and any company's most valuable resource, its data. NC | ||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |