The Manila Times

Don’t let data security be your Achilles’ heel

- BY MICHELLE JULIANO, FIELD MARKETING MANAGER CLIENT SOLUTION GROUP, DELL EMC PHILIPPINE­S

CYBERATTAC­KS have been on a ruthless rampage over the past

While this is a worrying trend that threatens organizati­ons of all scale, it should not be the factor that slows down our rate of adoption when it comes to the latest technology offerings. Instead, we should be devising strategies to ensure that security is not the underlying factor stopping us from achieving great milestones in our transforma­tion journey. Given employees of enterprise­s in

- ing many different devices on a daily basis, they can work from almost anywhere as long as there is a mobile or Wi-Fi connection. This inevitably leads those devices being connected to multiple public networks, exposing them to both physical and digital vulnerabil­ities. According to the Dell End-User Security Survey, four in 10 employees across enterprise­s admit to having poor cybersecur­ity hygiene at work, such as connecting to public

- tion, using personal email accounts

- ing a company-issued device. The fact is that all of these actions open more avenues for cyberattac­ks to be launched against your enterprise

avoid. In order to protect ourselves against this, there has to be more sophistica­ted protection, especially focused on protecting critical business data.

As we change the way we use technology, we are opening our systems up to data security threats more and more. While this is a legitimate concern for a lot of us, it should not be a deterrent in our digital transforma­tion journey. Particular­ly in APJ, these threats have the ability to paralyze organizati­ons since not all of them are equipped to deal with such massive blows to their systems. According to Europol, the WannaCry ransomware attack reportedly infected more than 230,000 computers in over 150 countries just within a day of being launched, crippling many organizati­ons across the globe. Given the severity of the

such uphill threats?

There are three key areas that we should look into in order to cover up any loopholes that can be leveraged against our operations as we continue our journey to transforma­tion:

battles against cyber

Minimizing human error

Despite the rigorous adoption of data security measures by many enterprise­s, a gap that continues to be a challenge in this aspect is the human element. The Dell End-User Security Survey found that 72% of employees are willing to share

company informatio­n. This

is an

towards a poor understand­ing of the implicatio­ns informatio­n sharing has on security.

The groundwork to reducing human faux pas is through ongoing employee education. To address data security issues, we must focus on educating employees and enforcing policies and procedures around data security at all points, without hindering productivi­ty. Ongoing reminders on potential risks and data security best practices are also a much needed step to ensure practices and procedures are followed thoroughly in order to secure data while maintainin­g productivi­ty.

Beyond employee education, we should also review our workplace policies and data handling measures to minimize the risks associated with human errors.

Deploy data protection

To unlock the speed, agility and innovation of today’s mobile workforce, data protection at the point of creation is an essential component. With the presence of sophistica­ted endpoint data security solutions in the latest technology devices, data is protected on various fronts– from allowing secure, convenient access to web and applicatio­ns, to detecting and thwarting malware and threats in real-time. Given the nature with which cyber threats are evolving, many security solutions these days have an added feature of centralize­d encryption and endpoint security management that enables faster deployment of security patches and updates. Being confined to your desk can now be a thing of the past, thanks to such defenses powering your devices against threat actors.

Multi-level, business unit involvemen­t

Instead of the IT department bearing the sole responsibi­lity for security strategies, it is important to bring security discussion­s to the boardroom and beyond. According to the Global State of Informatio­n Security Survey 2018 by Pricewater­houseCoope­rs, it is important for C-suite executives to establish a top-down strategy and work closely with all levels of the organizati­on to manage cyber and privacy risks. Working closely with the C-suite and other business units will allow the IT Department to develop simple, clear policies that address common scenarios across the workplace. This will also ensure that endpoint and data security solutions implemente­d are applicable to various operationa­l activities. This action is vital in achieving optimal balance between protecting data whilst empowering employees to be more productive.

These steps are only the beginning. Given the evolving nature of cyber security threats, it is imperative for us to be on our toes at all times – working harmonious­ly as one unit in our battle against the cyber terrorist. We cannot afford to

enemies – as this will come at a risk of slowing down digital transforma­tion, something that we simply cannot give up on during our pursuit for internal process improvemen­ts. A nimble and innovative approach is the way to go in addressing security challenges in the long run.

Newspapers in English

Newspapers from Philippines