The Borneo Post (Sabah)

Keeping data safe in an ‘always-on’ world

-

KUALA LUMPUR: One of the greatest advantages of a mobileenab­led workforce is no doubt the employee’s ability to always be connected.

Unfortunat­ely, this also expands the risk as mobile-enabled employees are more exposed to cyber security threats worldwide.

Sanjay Rohatgi, senior vice president of Symantec Asia Pacific and Japan, highlighte­d this recently, and pointed out that in today’s complex and rapidly changing threat environmen­t, informatio­n security profession­als are facing increasing number of security breaches than ever before – in 2014, more than 317 million new pieces of malware created last year, and five out of six large companies were attacked .

“Another trend observed this year was the increase in security threats in small and medium-sized organisati­ons.

“About 60 per cent of all targeted attacks struck small and medium sized organisati­ons globally, since these organisati­ons often have fewer resources to invest in security. Many are still not adopting basic best practices like blocking executable files and screensave­r email attachment­s,” Sanjay said.

“As the popularity of smartphone­s exploded in the last five years, IT department­s have learnt to deal with the trend of ‘Bring Your Own Device’.

“But today, it is no longer just about the device, but also about ‘Bring Your Own Applicatio­n’ and ‘Bring Your Own Cloud’ into the workplace.

“Mobile applicatio­ns and cloud services are increasing­ly embedded into all parts of our personal lives. Organisati­ons are finding that their employees increasing­ly want to use their own apps, clouds, personal mobile devices and platforms to work (often alongside corporate-provided devices/platforms).

“And they can’t be stopped. Employers need to embrace the use of mobile devices and cloud storage tools, such as Dropbox and Google Drive, for both work and personal agendas, or risk losing their talent,” he explained.

With personal devices and cloud applicatio­ns now being used to access corporate email, calendars, applicatio­ns and data; many organisati­ons are struggling with how to fully define the impact to their security posture and establish acceptable procedures and support models that balance both their employees’ needs and their security concerns, he noted.

“Companies are managing up to 75 point products, resulting in too many alerts and false positives to deal with. Most attacks go undetected because today’s security products are not integrated across all three control points: endpoint, network, email,” he added.

So, what can companies do to better protect themselves and their customers’, sensitive data from security threats? Sanjay advised, organisati­ons should uncover advanced threats. He pointed out that the first step is to gain visibility of the present state of dormant and active live threats within your network environmen­t and across your IT asset estate.

“Advanced attacks can cut across multiple control points making it worse for customers. What’s more, many threats go undetected for months or longer. Your IT department will need to secure user devices accessing emails and also provide additional access to content and web apps,” he said.

Sanjay also highlighte­d that organisati­ons should prioritise what matters in a company. He advised that companies should assess

the situation and prioritise those that are the most critical and time-sensitive.

He also urged organisati­ons to remediate fast. He said, “If you lose your phone or PDA that was issued by an organisati­on, your IT department may consider to revoke issued certificat­es or ask you to log into websites to change your password immediatel­y.

“Furthermor­e, companies should opt for security products that can provide administra­tors with the visibility and ‘rich’ intelligen­ce needed to uncover and remediate advanced attacks.”

Aside from that, Sanjay said, companies should leverage on existing investment­s.

He said, “Organisati­ons don’t want to install any more point products or any new agents that potentiall­y cause disruption to their entire enterprise.

“Solutions like Symantec Advanced Threat Protection (ATP) leverages existing threat protection infrastruc­ture, helping companies to achieve an effective data protection regime without the expense and implementa­tion issues from vendors.”

Overall, he said, “By adopting strategies that are flexible and scalable and taking advantage of new and upcoming security features, organisati­ons will be better-equipped to deal with incoming — and even sometimes unforeseen — challenges to their security infrastruc­ture.” KUALA LUMPUR: Dell has announced updates to the SonicWALL Secure Mobile Access (SMA) operating system (OS) that provide remote workers using smartphone­s, tablets or laptops with policy-enforced SSL VPN access to missioncri­tical applicatio­ns, data and resources.

According to a press release, the new Dell SonicWALL SMA 11.4 gives organisati­ons the power to easily provision secure mobile access on a global scale, regardless of data type, device used and/or remote worker location, with a new turnkey approach that ensures secure access of multiple concurrent users.

For users in highly regulated industries such as government, financial and health care, the SonicWALL SMA portfolio has new capabiliti­es to ensure security compliance with the latest industry and government regulation­s.

According to the 2016 Dell Security Annual Threat Report, malware for the Android ecosystem continues to rise, putting a majority of all smartphone­s at risk.

Not only has Android-specific ransomware gained popularity throughout the year, but Android malware writers continue to be on the fast track to finding creative ways to evade detection and analysis.

With the number of both corporate-issued and personal devices used by employees to access corporate network assets, this alarming trend in Android malware attacks has organisati­ons grappling with how to provide secure access to company applicatio­ns, data and resources, from any device, without compromisi­ng the security of the network.

Han Chon, director, Security and Endpoint Systems Management, Dell Asia Pacific & Japan said, “With so many mobile devices being brought into the workplace by a growing remote workforce, both employer-issued and personally owned, data and applicatio­ns are intermingl­ing and putting organizati­ons at an increased risk of a serious security breach.

“The Dell SonicWALL Secure Mobile Access (SMA) portfolio addresses the need for organizati­ons to quickly minimize the window of exposure for remote and mobile workers before an attacker can potentiall­y cripple the organizati­on by gaining access to corporate data either in-flight or on the mobile device itself.

“Dell SonicWALL SMA 11.4 provides our customers with completely secure mobile access to any data type, through any device, to any authorised users as dictated by their IT administra­tors.”

 ??  ?? Experts advised organisati­ons to adopt strategies that are flexible and scalable. It should also be better-equipped to deal with incoming — and even sometimes unforeseen — challenges to their security infrastruc­ture. — Reuters photo
Experts advised organisati­ons to adopt strategies that are flexible and scalable. It should also be better-equipped to deal with incoming — and even sometimes unforeseen — challenges to their security infrastruc­ture. — Reuters photo
 ??  ??
 ??  ?? Sanjay Rohatgi
Sanjay Rohatgi

Newspapers in English

Newspapers from Malaysia