Tag Archives: byod

Network Abuse: Don’t Push Your ‘Luck’

16 Mar 17
lverbik
, , , , , , , , , , , , , , , , , , , , , ,
No Comments

Look around your office. Isn’t it great to see your team hard at work on their computers? Yet if we take a closer look, let’s see what’s really happening…

Joe, your new sales rep, is poring over last weekend’s game stats…

Amy in marketing is looking for a new job, surfing your competitors’ websites, chatting with their HR people…

Wes, over in customer support, just bogged down your entire network by downloading a video file of Metallica in concert…

Guy, your new hire in shipping, is on hotdate.com, viewing questionable photos…

Bob in accounting is browsing stock-investing sites, in search of a hot tip…

Okay, so maybe it’s not that bad at your company. But this type of behavior will happen to some degree if you don’t proactively prevent it. The real problem is, unfiltered content often links to malware and other threats. Ignore it and you risk productivity losses, legal liabilities, extortion, blackmail and fraud. And not only that, the resulting data loss and corruption can cost your company big-time. Cyberthreats stemming from unfiltered content aren’t something you can count on your lucky leprechaun or four-leaf clover to protect you from.

In today’s mobile environment, content filtering has becoming a greater challenge than ever before. Your company may already be doing some filtering at the network level. However, when was the last time you checked the number of mobile devices linked to your network? As your workforce goes mobile, your network is exposed to a rapidly expanding “attack surface.” With BYOD (bring your own device) now the norm, the old rules of content filtering just don’t cut it anymore.

Are You Making Any Of These Mistakes?

Old content-filtering models presume your network has a safe “firewall.” But now, with BYOD, you need a different way to protect your data. And that’s where endpoint security comes into play. Endpoint filtering keeps devices on your network safe from infection, no matter where they hook into the Internet.

But make ANY of the following mistakes with endpoint security and your network could be a sitting duck:

  1. Missing even ONE endpoint. This applies to tablets and smartphones as well as home-based machines that VPN into your network.
  1. Skimping on security policies, protocols and training. Believing that tech tools alone will keep your network secure is a recipe for breaches. In fact, no technology can keep a network safe if users cut corners.
  1. Leaving endpoint filtering out of your overall security plan. Ad hoc security invites disaster. An improperly designed system exposes holes that hackers love to find.

So, What Exactly Should You Filter?

Forrester Research states that companies whose users access the cloud should:

  • Detect and intercept unusual or fraudulent activities related to data in the cloud.
  • Detect, neutralize and eliminate malware in cloud platforms.
  • Detect and monitor unsanctioned cloud applications and platforms usage.
  • Protect against leaks of confidential information.
  • Encrypt structured and unstructured data in cloud platforms.
  • Investigate suspicious users and incidents.

Between BYOD and ever more complex cyber threats, you simply can’t afford to run around putting out fires. You absolutely MUST proactively defend your network in depth with endpoint content filtering.

Lost Employee Smartphone? Do This NOW!

07 Sep 16
lverbik
, , , , , , , , , , , , , , ,
No Comments
“Hey boss, I lost my smartphone.”
How well have you prepared for this moment? It will happen sooner or later. If your company has a plan in place, no big deal. If not, you may suddenly get that sinking feeling in your gut …
And well you might. You now have three big worries:
Compliance Issues – If your employee had access to information covered by any number of regulations, your company could be subject to stiff penalties. One employer we know of wound up with a $900,000 fine.
Data Security – Sensitive company data in the wrong hands could spell disaster. Access to your network, secure sites, proprietary files, work-related e-mails and corporate secrets may now be out of your control. You must move quickly to prevent serious financial harm.
Employee Privacy and Property Concerns – If a valued employee had family photos and movies on the device, and you remotely delete all data on the phone, you may now have a disgruntled, or even uncooperative, employee. Especially if company policy regarding BYOD (bring your own device) and data loss were not clearly stated and agreed to up-front.
So how do you prevent a relatively minor incident from blowing up into a big problem? Here are seven smart measures you can take right now to prepare for the day an employee smartphone is lost or stolen:
1. Install a mobile device management (MDM) system on any employee device to be used at work. This software can create a virtual wall separating work data from personal. It facilitates any security measures you wish to impose. And to protect employee privacy, it can limit company access to work data only.
2. Determine which devices will be allowed and which types of company data people may access from them.
3. Require that employees agree with an Acceptable Use Policy before they connect to your network. Make sure these include notice as to conditions in which company data may be “wiped” – i.e., destroyed. Also include specific policies regarding device inspection and removal of company records.
4. Put strong data protection practices in place. Require use of hard-to-crack passwords and auto-locking after periods of inactivity. Establish protocols for reporting lost or stolen devices. Mandate antivirus and other protective software as well as regular backups.
5. Designate someone at your company to authorize access to software and critical data. This person can also be your main point of contact for questions about BYOD policy and practices. It might also work well to distribute a resource page or FAQ document to your employees.
6. Establish a standard protocol for what to do when a device is lost or stolen. Both Android and iOS phones have features that allow device owners to locate, lock and/or “wipe” all data on their phones. Make sure your policy requires that these features are set up in advance. Then, when a device is lost or stolen, your employee can be instructed to take appropriate action according to your protocol in order to protect company data.
7. And finally, your best protection is to implement a well-crafted BYOD policy in advance. Develop it in partnership with risk management and operations personnel, as well as legal counsel and IT professionals, to come up with an effective and comprehensive plan.
Don’t risk waiting until an incident occurs!
This is a serious vulnerability that can and must be addressed in order to assure the safety of your company’s data and systems.
Contact a Techno Pro today to see how we can help.

What can hosted workspaces do for your business?

16 Dec 15
lverbik
, , , , , , , , , , , , , , , , , , , , , ,
No Comments

As our culture continually evolves more and more toward mobility and flexibility with the use of tablets, smartphones and notebook computers, business is happening all the time, everywhere, in places we never would have dreamed. Companies are implementing BYOD (bring your own device) policies to make it easy for their employees to maintain a productive pace after they leave the office. And there’s a growing trend emerging to make it work to a company’s advantage.

The concept of a hosted workspace involves a desktop environment situated on a remote server that provides a “virtual office” where employees’ own personal devices can be used to do business seamlessly and relatively safely. Users have easy access from their various devices, from virtually anywhere they may be—inside or outside the office.

It provides a nice little setup giving users a way to interact and work with all of a company’s data, applications and programs just as they would a traditional desktop computer environment—but without the stationary, cumbersome, and costlier machines anchoring them to workstations.

The hosted workspace means that, as a business, you are saving on equipment costs and the constant software upgrades that go along with these conventional setups. Hosted workspaces work and grow with you no matter what the size of your company.

If you fear less security with a mobile environment, your fears are unfounded. The opposite is actually true. Hosted workspaces are proven more secure—providing built in security features, including virus protection and secure cloud server storage for your data. And if you think about what you could lose should your security be breached in a traditional office computer environment, you’re looking at what can be a devastating loss.

So for many businesses, hosted workspaces offer the best advantages that mobile technology has to offer, while keeping your employees nimble and efficient—to do business anywhere. We think that’s a pretty cool idea. Contact us here to find out how TechnoAdvantage can help you craft your own hosted workspace.