Sunday, August 12, 2012

IT overstretched in fight against online attacks | Simply Security

Posted on August 10th, 2012 in Internet Safety, Vulnerabilities by Simply Security | Be the first to comment | Tags: Internet Safety, Vulnerabilities

IT security enforcement continues to struggle.

IT security enforcement continues to struggle.

The face of corporate technology has been in flux for the past few years. Where once it was impossible to do much outside the office, now mobile devices like tablets and smartphones make work accessible and easy from any location, with or without a Wi-Fi hotspot. Increases in online collaboration, remote work and enhanced computing power means more flexibility, resulting in cost savings for businesses as they reduce on-site workforce and data storage.

By the same token, IT personnel are left scrambling to accommodate all these new risks to data protection, like BYOD (bring-your-own-device) programs and cloud computing solutions. The immediacy of these additions leaves no room for delay or error, but with so much coming at them at once and the rest of the organization failing to grasp the full impact and logistics of these tools, IT security enforcement continues to struggle.

Users like the cloud

One of leading technologies now getting integrated into the workforce is online storage, but cloud security at the enterprise level hasn't really caught up. Even in situations where these tools aren't offered by the office, employees will seek them out on their own, ignoring in-house data policies. This is even more marked with personal devices, so considering a cloud solution should go hand in hand with BYOD, or else data threats could be more pressing.

That's particularly the case with enterprises where there is no set limitation on these utilities, according to Cloud Computing News. The source reported on a Spiceworks study that showed one-third of all workers are already using the cloud for business activities, but a similar percentage of organizations discouraged the entire practice.

The problem is, denying people the ability to access Google Drive and other similar storage solutions could wind up with them using whatever tool they want. Spiceworks said a third of organizations already have this exact mentality, but considering nearly 90 percent of responding employees used DropBox at the time of the survey, it could be more trouble than it's worth. Not long ago the storage provider suffered a major spam attack, resulting in the potential loss of thousands of email addresses and passwords, which could cost businesses dearly if their employees are using this service instead of a more secure solution.

Collaborative problem solving

Organizations shouldn't outlaw the service in the workplace completely, but they should have oversight in its selection and use. Having endpoint security is one way of managing access and protection of documents, but incorporating cloud security can keep this information safe at all levels and access points. Opening lines of communication between IT personnel, general staff and other management can create a discourse of needs and wants to better orchestrate the move to mobile online solutions.

Currently, however, many in the IT field state they're fighting a losing battle on their own. ISACA reported that about one-fifth of organizational information technology specialists are losing to hackers, with data breaches on the rise in frequency and severity every year. IT Wire reported for the association that these concerns were worst in the Asia Pacific area, but that international concerns were continuing to mount. Since the internet is an online community, it would make sense for collaboration against hackers to take place there, but no web chat can adequately insinuate the needs of a business enterprise.

For that reason, Businessday Online reported that some legislators have tried to push cybercrime laws into effect, but due to other political issues these bills have largely been pushed aside for the time being at least. In the meantime, countries like Nigeria continue to creep up the global threat ladder in terms of potency of online threats posed. The Payment Card Industry Data Security Standard has thus been increased of its own accord to block continued attacks like that incurred against Global Payment Systems, the source reported.

"Data collection is increasing at such a rapid rate that it's not surprising that there is a level of concern among industry professionals around how to keep all company infrastructure secure," ISACA director Jo Stewart-Rattray told ZDNet. "All organizations need to ensure that there are adequate security frameworks and guidelines in place to keep proprietary and sensitive company data secure."

The ISACA 2012 Governance and Enterprise IT survey uncovered that the majority of what threatens information the most right now is user error and data leaks. Companies aren't associating these data protection risks directly with either hackers, rather pointing out internal user error as the main cause and BYOD a supporting factor, but these threats must be taken seriously regardless of their issuance. Creating open collaboration between IT and the rest of the organization can bridge the gap in data security.

Source: http://www.simplysecurity.com/2012/08/10/it-overstretched-in-fight-against-online-attacks/

new hunger games trailer sasquatch david choe national wear red day gunner kiel gunner kiel groundhog

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.