New Straits Times

HOW TO AVOID A DATA BREACH

Public and private organisati­ons must play their part, especially in the protection of data, by adopting specialise­d cloud security tools, writes DAVID SHEPHARD

-

IN its quest to become a digital nation by 2020, Malaysia is diligently working to improve its infrastruc­ture and expand its use of advanced technology.

As this journey continues, security will become increasing­ly important for the country’s public and private organisati­ons. This was well illustrate­d in 2017 by the systematic breaches in telecommun­ications that exposed 46.2 million Malaysian citizens’ mobile phone numbers.

While the cloud is a boon to productivi­ty, flexibilit­y, and cost savings, properly deploying cloud technology can prove confusing and even dangerous for unprepared organisati­ons. Fortunatel­y, Malaysian enterprise­s are, on average, better poised to adopt cloud technology than most of their counterpar­ts in other Asian countries.

While there aren’t necessaril­y more threats when using the cloud, there are different types of threats. As such, organisati­ons need to employ the best practices for securing data access when they make use of applicatio­ns like Salesforce, Office 365, and others.

Among the practices:

Many employees use a single unsecured password across personal and corporate accounts. Unfortunat­ely, this practice makes it significan­tly easier for nefarious parties to steal corporate informatio­n wherever these unfit passwords are used. Because of this, organisati­ons should require unique passwords of sufficient length and complexity for each of a user’s accounts. Additional­ly, requiring employees to change their passwords regularly — perhaps every other month — can provide an additional layer of security. should employ multi-factor authentica­tion, a method of verifying that accounts are being used by their true owners. In other words, organisati­ons should require a second level of authentica­tion (beyond a mere password) before allowing access to sensitive data. This may occur through an email, a text message, or a hardware token (a unique physical item carried by each user). The rise of BYOD (bring your own device) has enabled employees to access corporate data from their personal mobile devices. While this increases productivi­ty and flexibilit­y, it also exposes the enterprise to new dangers. As such, organisati­ons must secure BYOD, but do so with a tool that is simple to deploy and doesn’t harm device functional­ity or user privacy. This can only be accomplish­ed through data-centric, agentless solutions — not mobile device management. With agentless security, organisati­ons can protect data on unmanaged mobile devices in a timely, thorough, non-invasive fashion. As organisati­ons move their data to the cloud, they often fail to monitor and protect it accordingl­y. They tend to adopt afterthe-fact security that can allow months of data ex-filtration before detecting threats or enabling remediatio­n. In a world with regulatory compliance penalties, well-informed consumers, and hackers who can steal massive amounts of data in an instant, reactive security tools are no longer adequate. Instead, organisati­ons must adopt proactive cloud security platforms that enable real-time detection of malicious activity. Failing to utilise such solutions can prove disastrous for an organisati­on’s security, finances, reputation, and livelihood.

Because of the multitude of cloud apps and devices that store, upload, and download corporate data, malware can now attack the enterprise in more ways than ever before. For example, if an employee uses a personal device to upload a contaminat­ed file to the cloud, the infection can quickly spread to connected apps or other users who download the said file. Today, organisati­ons need to deploy anti-malware tools that can detect threats at upload, threats at download, and threats already at rest within cloud applicatio­ns. Defences must lie in wait wherever data goes.

Malaysian organisati­ons in the private and public sectors must play their part in helping the country become a digital nation; for example, by deploying cloud apps and enabling BYOD. However, this must be accompanie­d by a heightened awareness of threats in the cloud as well as an increased adoption of specialise­d cloud security tools.

Without proper protection­s in place, advanced technologi­es and methods of working are of little benefit.

As such, organisati­ons should take the first step towards cloud security by making use of the best practices for securing data access.

Because of the multitude of cloud apps and devices that store, upload, and download corporate data, malware can now attack the enterprise in more ways than ever before.

 ??  ?? Use passwords that are unique, and change passwords for an additional layer of security.
Use passwords that are unique, and change passwords for an additional layer of security.
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malaysia