Ten Ways the IT Department Enables Cyber Crime - Slide 4

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Ten Ways the IT Department Enables Cyber Crime-4 Next

A few years ago, our corporate IT networks were defined with a solid perimeter. Protection technologies clearly delineated what was internal to the network, and what was external, much like a moat around a medieval castle. External devices were considered untrusted, and those inside benefitted from the protection of the corporate firewall, much like the castle walls.

Businesses worldwide are seeing increasing benefits from empowering remote or mobile workers. Advances in mobile technology have allowed companies to create an “ever-connected” worker who can have full access to critical corporate resources, such as applications, documents, and email, from anywhere in the world, as they travel. That access includes handheld devices.

A strong security policy for a laptop computer fundamentally differs from one for a desktop computer. Often, desktop computers that are used only within the business place don’t need certain technologies, such as individual firewalls. But laptops need situational awareness. When they leave the relative safety of the business network, security enhancements should be automatically programmed to “switch on.” Security measures — such as enabling a firewall, disabling non-password-enabled Bluetooth and wireless connections, and increased scrutiny of USB devices — should be automatically engaged whenever a laptop is taken out of the company network.

End-user demands for access to the World Wide Web and all of the communication vehicles that it affords are at an all-time high. Business demands for those same communication vehicles are also on the rise. The mobility of employees and company data present a growing challenge and keeping up with the exponentially growing cyber crime threat is daunting.

As a result, and often without their knowledge or understanding, many IT departments have become accomplices to cyber crime. This slideshow explains the various ways that corporate IT departments are enabling cyber crime in our environments, and provides some guidelines to prevent this dangerous, destructive practice from continuing.

This slideshow features 10 ways that IT departments are enabling cyber criminals today, as identified by Kaspersky Lab experts, and offers ways to stop them.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.