Can your IT hack it?

Townsville Bulletin - - NEWS -

WITH wide­spread ran­somware at­tacks this week, we should re­visit keep­ing our busi­ness IT, cus­tomer data and staff de­vices se­cure.

Tak­ing our busi­ness on­line and lever­ag­ing the “cloud”, we ex­pose our data to our staff, but also to greater risk of se­cu­rity breaches.

There are three main ar­eas to stay on top of to max­imise your pro­tec­tion and min­imise the im­pact of a breach.

First, you need to po­lice and mon­i­tor ac­cess points to your net­work.

With the ad­vent of BYOD ( bring your own de­vice) IT in­fra­struc­ture now has in­nu­mer­able de­vices we can’t quite con­trol ac­cess­ing our net­works.

Th­ese de­vices need to be lim­ited care­fully to re­strict what they can ac­cess in­side your busi­ness when re­mote.

Whitelist­ing where you only al­low known de­vices ac­cess to your net- work for your own staff de­vices is also an ex­cel­lent way to keep out any un­wel­come users from ac­cess­ing your net­work with­out your per­mis­sion.

You also need to en­force pol­icy to se­cure de­vices and the data on them should they be lost and fall into the wrong hands.

En­forc­ing long pass­words and even biose­cu­rity mea­sures such as fin­ger­print or fa­cial recog­ni­tion go a long way to keep­ing the wrong peo­ple off your de­vices.

Se­condly, you should look to en­crypt data se­curely when­ever in tran­sit or when stored.

Mid­dle- man at­tacks are where data trans­mit­ted is in­ter­cepted on WiFi con­nec­tions and can be read by the in­ter­cep­tor.

En­crypt all com­mu­ni­ca­tions from your team back to the of­fice and this in­ter­cepted data will more likely be kept se­cured.

With on­line pay­ments grow­ing rapidly, we also see the loss of cus­tomer data as em­bar­rass­ing but also di­rec­tors can be held li­able if that data is not be­ing se­curely main­tained.

Fi­nally, if you do get breached and have your sys­tems locked down by a crypto- lock ex­tor­tion at­tack, you need to have re­dun­dancy built in to al­low busi­ness op­er­a­tions to con­tinue.

Hav­ing copies of your web­site, cus­tomer records, in­ven­tory records and fi­nan­cial records backed up daily ( live if a small busi­ness) to an off site data fa­cil­ity means you can re­place any files or data that be­comes cor­rupted.

It may still take a lit­tle time to get back up to full speed, but at least you will have records to work off.

Be sure to get pro­fes­sional help to se­cure your busi­ness and your data as you look to open your busi­ness up to lever­ag­ing the ben­e­fits of go­ing mo­bile for your team. Get a se­cu­rity pro­fes­sional to au­dit your ac­cess points, data se­cu­rity and back ups.

Newspapers in English

Newspapers from Australia

© PressReader. All rights reserved.