With major computer security breaches seemingly topping headlines every week, it’s clear that organizations need to recognize that it is not a matter of if when it comes to security breaches. It is a matter of when.
As if IT and users didn’t already have enough security threats to worry about — viruses and malware via email and the web, DDoS (Distributed Denial of Service) attacks, “phishing” emails and major code flaws in popular programs — new ways of working also mean new, additional threats to contend with.
Here’s a quick look at three of these new and emerging tech security threats, and ways that IT can work to prevent or respond to incidents.
The growing capabilities of our mobile devices (and increased access to Wi-Fi through public wireless Internet service) are a key component of information mobility. Being computer-productive while away from the desktop PC and the office LAN is great for business. But this growing reliance on mobile devices also means more potential vulnerabilities beyond IT’s direct control:
1. Use mobile device management (MDM) for company-owned mobile devices as well as employee-owned BYODs.
2. Use tools and services to ensure employees are only connecting to authorized, non-“rogue” hotspots, going to the correct destinations (as opposed to sites pretending to be them), and using VPNs and/or other encryption for all connections and traffic.
3. Help ensure all mobile devices are running security software, and using strong security settings and precautions.