View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Leadership
  2. Strategy
July 3, 2013

Guest Blog: There’s more to IT security than a cyber-attack

When it comes to tackling IT security threats, Stephen Midgley, VP, Global Marketing at Absolute Software, thinks a rethink is in order.

By Cbr Rolling Blog

Midgely

The results of the recent Financial Times/ICSA Boardroom Bellwether survey highlight a worrying trend in how corporations are tackling evolving security threats, in particular those in the cyber area.

Just 21% of the companies surveyed had assessed their vulnerability to cyber-attack and put necessary provisions in place. The survey begs the question that if a business doesn’t have the infrastructure in place to combat external threats, is it in a position to ensure the security and strength of its corporate digital infrastructure? Managing corporate cyber-security is more than just responding to external hacking attacks.

With every corporate device acting as a potential gateway into a business’ infrastructure, cyber security provisions must extend beyond the firewall. If an employee is using their own device and it happens to contain malware or unauthorised applications, then this can represent a security vulnerability. The kind of external hacking attacks that the survey discusses are only one of the ways that third parties can gain illegal access to sensitive data. Given that a work-enabled smartphone or tablet has access to as much sensitive data as a desktop PC, a compromised portable device could pose as much of a threat as a successful hacking attack.

With more organisations allowing employees to use their own devices for corporate purposes, the IT department has less control than with corporately owned hardware. IT teams are under mounting pressure to allow the use of privately owned consumer devices, but are faced with the challenge of trying to manage each individual device. Ensuring applications are patched regularly, or that devices aren’t taken outside certain areas or used on public wireless networks, becomes difficult when the operating system and type of hardware varies from user to user.

Successful security policies need to offer a holistic approach, encompassing all potential security risks. These measures have to be able to respond to the threat that each device and end-user presents, and be able to act as soon as a device becomes a security risk. Whether this is through unauthorised applications or device usage, data security threats don’t just stop at cyber-security hacking risks. However, the challenge for businesses is to give employees the freedom to use their own devices, but without compromising security and productivity.

Content from our partners
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU