SIR - Wireless technology is fast becoming a ubiquitous business tool. Advances in technology and the roll-out of Broadband are both responsible, as is the ever-growing number of employees working remotely from home. However, the Big Issue when considering - and subsequently deploying - remote working technology is security.
What are the key dangers involved with remote working, and what can client organisations do to combat them? The Number One threat is still the dreaded computer virus. Detached from their ‘Mother Ship' network, remote workers' computers are often not up-to-date with the latest anti-virus software.
Organisations should treat remote users as though they are on the company network because, if their systems become infected, they could pass that ‘infection' on to customers. In turn, this may be very damaging for the business.
Effective security for remote working requires an integrated, multi-layered and determined approach wherein designated professionals wrest responsibility for IT security from the end user and, instead, deploy it centrally such that members of staff do not have to navigate for themselves.
On another (related) matter, the security of any business will ultimately boil down to safeguarding the right information assets - the ‘Crown Jewels' of the company - which are critical to its efficient operation. That necessitates looking at data security from a management perspective, and not as an IT issue. Indeed, if organisations are considering information security from an IT perspective then they run the risk of putting in place point solutions that do little to secure the actual business.
Taking a risk management approach enables an organisation to assess what information is business critical, and therefore what the implications will be if that information becomes disclosed, unavailable, mistrusted or corrupt. This identifies the regulations and legislation to be respected. The final part of the assessment process is the establishment of controls to manage the risks.
Technology is only one part of that. However, most organisations do not have the in-house IT resource with the correct breadth and depth of knowledge to manage the strategic security of the business effectively. Also, many do not have the time or ability to stand back from the day-to-day fire-fighting and look at what security is needed.
Opting to outsource strategic security evaluations to a third party enables the business to receive a thorough security solution that matches its requirements. A managed service provider can deliver control and flexibility of information security systems without either the pain or cost of running them yourself, or the traditional constraints of full outsourcing. It's worth thinking about.
Tom Salkield Director Netstore Security
Source
SMT
No comments yet