IT | Security

IT Security is About More Than Cyber-Attacks

By: Absolute Editorial Team | 6/20/2014

I recently contributed to IDG Connect, talking about how “There’s More to IT Security Than a Cyber-Attack,” which tries to balance out the whole risk landscape affecting organizations. Given the number of high profile data breaches in the past year, and the obvious increase in organized and planned out attacks, many organizations have shifted too much emphasis to preventing cybercrime, leaving other areas at risk.

In the recently released National Strategic Assessment of Serious and Organised Crime 2014, the National Crime Agency in the UK laid out the many external threats from hacking and viruses, which are real issues, but no mention was made of the numerous internal threats that continue to lead to data breaches for organizations of all sizes.

Employees can put businesses at risk through the way they use and interact with smartphones and tablets. Apps, email, text messages, and use of unsecured wireless all open organizations to the same external threats mentioned in the report, not to mention the added risks if devices are lost or stolen. The danger is magnified by the fact that these devices have access to as much sensitive corporate data as a desktop, leading to serious financial and repetitional consequences.

In the article, I examine how BYOD amplifies some of these risks and how the blurred line between personal and corporate devices places unnecessary risks on corporate data. As we saw in our recent survey, 23% of employees don’t believe that the security of their company’s data is their responsibility. So whose responsibility is it and what can be done?

Successful security policies that counteract internal threats to an organisation need to offer a holistic approach, encompassing all potential security risks. Businesses can adopt sophisticated solutions such as Absolute Manage to face these risks, whether its unauthorized apps or device usage or data security threats. Your data security plans must extend beyond the firewall - contact us to learn how to manage and secure the data stored on and accessed via all your various endpoints.