| |||||||||
| |||||||||
Current Filter: Network>>>>>Feature> Guarding the valuables Editorial Type: Feature Date: 03-2015 Views: 2159 Key Topics: Networking Security Cybercrime Infrastructure Hacking Hacking attacks Key Companies: Brainloop Key Products: Key Industries: | |||
| Mark Edge, UK Country Manager & VP Sales at Brainloop says that a new approach to IT security is needed: one that guards data within a protected infrastructure With the growing threat of cybercrime and security breaches and increased incidents of data loss, securing your information has never been more important. Statistics released this month from The Online Trust Alliance revealed that from January to June 2014 only 40 per cent of data breaches involving the loss of personally identifiable information (PII) were caused by external intrusions: 29 per cent were caused either accidentally or maliciously by employees. Whilst tackling the cyber security challenge has become more difficult, the good news is that it is not insurmountable. It does, however, require a different approach to the traditional one of protecting the infrastructure and adding reinforced firewalls that ring-fence your company's information. In today's world where employees are a significant source of security breaches, securing applications and systems is only half the job.
A NEW APPROACH Organisations need to find a way of protecting valuable information without enforcing draconian security policies on staff that will negatively impact their ability to work. What's needed is a new approach to IT security that not only protects your IT infrastructure, but protects the data itself.
WHAT'S IMPORTANT? TrendLabs state that 56 per cent of employees frequently store sensitive data on their laptops, smartphones, tablets and other mobile devices. What's worse is that this data is all too often unguarded.
KISS - KEEP IT SIMPLE SECURITY Focus your security policy on the high-risk areas first, for example M&A documentation and valuable IP rather than chaining up everything. In most organisations, employees with access to sensitive information will be sharing it both inside and outside the business. The best security policy should enable them to continue to do this, safely and securely.
EASY DOES IT
A WINNING COMBINATION | ||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |