Management BYOD Infrastructure IoT Storage Security Privacy

Current Filter: Network>>>>>Feature>

PREVIOUS

Filtered Articles:2 of 224   Current Article ID:5650

NEXT



Endpoint backup

Editorial Type: Feature     Date: 07-2015    Views: 2966   









A good endpoint defence is the best offence claims Andy Hardy, Managing Director EMEA at Code42, who explains his views on endpoint data security

Gone are the days when corporate data was confined to an on premise data centre. Today's organisations are more mobile, adaptable and flexible than ever before. What does this mean for a company's data? In any enterprise, corporate information can be spread across thousands of devices ranging from desktops to smartphones.

This increase in endpoint devices adds a huge amount of risk to locally stored data if it is not appropriately protected. From leaving a tablet on a train, to inadvertently downloading a piece of malware onto your work PC, the risk from external factors is significant and omnipresent.

WHAT IS LURKING IN THE SHADOWS?
Any enterprise is likely to be equally vulnerable from both internal and external risks, with each employee representing a potential weak link. From downloading non-IT approved software onto work devices, to sharing data between a tablet and PC through consumer-grade sync/share tools, shadow IT is not only bad news for the CISO, but for the entire company.

Looking forward, the Internet of Things (IoT) is creating millions of new IP addresses on an array of devices, all capable of transmitting data, and at the same time virtual desktop clients are sending sensitive information across the internet. Unless adequately protected, the enterprise will become even more porous and sensitive information could simply vanish.

NO PERIMETER HIGH ENOUGH
It goes without saying that antivirus solutions and firewalls play a huge part in keeping companies safe. However, as recent hacking cases have shown, if a hacker is determined and skilled enough then there is little that organisations can do to keep them from accessing data.

Therefore, a comprehensive endpoint data security strategy is the best line of defence when it comes to the longevity and security of both important data and the network. Detecting threats is a vital element of this and it should be a mainstay of an organisation's security strategy.

Security must be continuous, not an occasional audit. Automated, consistent backup is crucial to protect data on both the endpoint device and in the cloud. Businesses also need to be in full control of this data, especially in light of the recent data sovereignty debate in Europe. By utilising encryption at both ends of the chain and in-transit, the enterprise can have complete control and visibility of its information. Additionally, if only the company holds the encryption keys, any high-level requests for data access must go through them (versus for example, a cloud vendor), thus assuaging concerns over data sovereignty.

A comprehensive endpoint security programme can take businesses beyond just detecting threats. Were a hacker to steal a mission-critical file from an endpoint device and then hold it to ransom, it now does not need to be a problem. The device can be wiped clean then restored to its status prior to attack. Similarly if a laptop is stolen, the entirety of the device can be mirrored to a new machine. In short, being hit by a malicious attack does not need to be a disaster.

Data visibility and historical forensics for security professionals and IT teams should also be considered, so businesses can see who has (or had) access to a specific file or data set at any given time. This means shadow IT practises can be identified allowing the IT team to educate on the risks of data neglect and pinpoint attacks.

An effective endpoint data security policy must employ adequate training, software and strategy to mitigate the risks of data loss and corruption. Appropriate backup really can back up the CISO and IT department when it comes to securing network endpoint devices and any company's most valuable resource, its data. NC

Like this article? Click here to get the Newsletter and Magazine Free!

Email The Editor!         OR         Forward ArticleGo Top


PREVIOUS

                    


NEXT