Monthly Archives: January 2015

The Growing Importance of Mobile Security

According to a report by CompTia, 28% of businesses view security as a significantly higher priority today compared to two years ago, and an even greater percentage of businesses expect the importance of security to rise in the next two years. The study also revealed that while many companies assumed a satisfactory level of security, they did not fully comprehend their exposure to potential security threats. The rise in security threats is largely due to emerging technologies, causing businesses to take a new approach to security. End users now have access to powerful devices and business class systems, often without the oversight of an IT team. Therefore, investing in mobile security is one the smartest things your small to medium sized business can do to protect your organization.

The Human Element to BYOD

According to the study, the factors in security breaches fall 45% to technology error and 55% to human error. With the BYOD (Bring Your Own Device) trend, more and more employees are bringing their own mobile devices to work, and end users typically do not have the background knowledge of security that allows them to recognize potential threats. The desire for productivity and flexibility is driving many businesses to adopt a “use first, secure later” attitude when it comes to mobile security, but this approach puts your business in danger.

Most Common Mobile Security Incidents

Mobility forces businesses to consider data leaving the company in the hands of its employees. The top three reasons for mobile security incidents include: lost/stolen devices, mobile malware, and employees disabling security features. Mobile malware is quickly becoming a growing concern, up 19% from 2012. Since there is a much stronger personal connection to mobile devices, employees are apt to want to use their device however they want to. And, since mobile devices are more closed than laptops, IT departments are not able to place the same safeguards on smartphones and tablets as they are on many other devices.

How to Develop a Mobile Security Plan

The biggest goal with mobile security becomes one of education rather than technical improvement. Companies are quickly realizing that their mobile device security education must be interactive, ongoing, and measurable in order to raise awareness about mobile security. Organizations that have made mobile security education a priority indicate that appropriate and effective training has provided a “relatively high value” or “very high value.” In addition to educating your employees, it’s important to encrypt data on mobile devices, keep OS and apps up to date, and prevent jailbreaking on smartphones. Also make sure that your employees keep passcodes on their devices; while this measure has limited security potential, it at least provides some protection against amateur attackers. If your organization needs guidance learning more about mobile security, contact your trusted IT advisor today.

Is Cloud Computing Secure?

In the early days of Cloud computing, the common perception was that the Cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business agility that comes with using Cloud systems. Yet, as Cloud adoption becomes more universal, these high levels of adoption are actually seeing an increased level of trust in Cloud computing systems, which begs the question: Can the Cloud lead to more secure computing?

Traditional Network Security

Traditionally, organizations have used on-premises security solutions or contracted with network security experts to protect their network, data, and applications. Data centers imbue a sense of security and control for businesses – feeling more secure is likened to locking down a warehouse and visualizing that anything within the walls of the organization is safe. There’s no question, then that businesses feel an inherent unease with the Cloud concept, because the approach itself seems insecure; your data is stored on servers and systems you don’t own or control. Yet, does control necessarily equate to security?

The Cloud is Just as Safe as On-Premises Security

IT security experts are claiming that fears of the Cloud being unsafe can largely be put to rest. In fact, the Cloud may actually be able to improve the state of IT security. Many Cloud  security experts dispel the Cloud insecurity myth. Many believe the Cloud is  more secure than traditional systems. So, can your business trust your Cloud Service Provider (CSP) to also handle network security?

Which Platform is Right for Your Business?

The answer depends on your needs as a business. Cloud providers can give end users a flexible infrastructure hosted from reliable systems, but your network can become compromised just as quickly by bad policy decisions as an on-premises environment. Speed of incident response and depth of forensics are just as important in preventing security attacks in the first place – the Cloud shows advantages in both of these areas. If you choose to go with the Cloud, make sure you are communicating with your Cloud provider to ensure they are meeting security standards.

In conclusion, IT security experts have agreed that Cloud systems are not inherently unsafe, but businesses still must exercise good judgment when it comes to developing a plan for network security. The best course of action is to focus on a well-defined and executed security strategy with the right technology with whichever platform you choose. If your organization needs guidance learning more about network security, contact your trusted IT advisor today.