Tips for Securing Data in a Mobile World

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Tips for Securing Data in a Mobile World-5 Next

Insider Threats

Insiders' mistakes are leading to costly security breaches.

We're human and we make mistakes. Consequently, information leaks will continue to be all too often caused by trusted insiders, i.e., users who leak information whether knowingly or unknowingly. By ignoring that the company's own users are already inside the perimeter and that they pose significant threat, CI(S)Os fail to address possibly the most fundamental persistent threat, that of a breach orchestrated by one or more of their organization's own users. If, for some reason, a vulnerability is opened in the data center, the door is literally left open for a breach to take place. Organizations that implement information protection and control mechanisms and a culture of security committed to safeguarding data will be better positioned for success.

Today, most of the sensitive and confidential information that a business has – executive communications, orders, reports and strategies – resides on computers and is often shared and accessed via email. An escalating amount of that email is also handled on BYOD devices, which travel with employees wherever they go. While information security teams understand the magnitude of the mobile threat, they are often not exactly sure how to secure information and data that is constantly on the move.

In the last few years, three different security scenarios have emerged – BYOD device flexibility, working outside the office, and the increasing threat of cyber security breaches. Together, they have formed a security threat most IT security teams simply are not able to comprehensively address.

Given the fluid nature of BYOD and related security issues, the next logical step is to approach the data's security independent of the device or location. The best minds in security are now paying attention to the vulnerability (or lack thereof) of the data itself, and less to the device on which it resides. If the data is secure wherever it goes, then where it resides becomes unimportant. 

This slideshow features important IT security points to consider for 2015 and beyond from Watchful Software.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.