Connect with us

Featured

How to avoid ‘Shadow IT’

Published

on

Shadow IT, or devices that have not been approved by an organisation can allow ransomware to invade an organisation’s network. BRENDAN MCARAVEY, Country Manager at Citrix SA offers some tips on how one can avoid these shady devices.

What is Shadow IT? It is technology used within an organisation without explicit approval — could be aptly terms as the modern Trojan horse! Since these technologies are not IT approved, they have the potential to allow ransomware and malware to invade an organisation’s network, cause data leaks and even introduce compliance risks.

It is critically important to fightback the malware, here are five easy ways to avoid shadow IT:

1. Understand the risks

Part of what makes the threat of shadow IT so insidious is a common lack of knowledge about the problem. More often than not, employees use unsanctioned technology, not for malicious reasons but rather because they are trying to find an intuitive solution for common business tasks. If a company’s existing technology solutions fail to address the needs of its employees, they will be forced to look to consumer-facing products.

It is integral to prevent that from happening and the response should be twofold:

·         Organisations must educate all employees about the risks of shadow IT, and there needs to be an enterprise-level solution that offers ease-of-use as well as advanced cybersecurity protections.

·         IT managers and business owners should develop a plan to pinpoint where employees implement non-IT-approved technology, then develop a strategy for eradicating the problem.

2. Boost your cybersecurity

It seems like nearly every day there’s a fresh headline about a major cyber-attack on a corporation or government office. The most recent local security breach reported was about sensitive information of 30 million South Africans being stolen from the credit bureau. And, prior to that more than six million accounts were at risk when the Ster-Kinekor’s website was hacked.

It is integral for an organisation to have a strategy for security technology that encompasses the virtualisation of applications, desktops and networks, as well as the centralisation of data to avoid exposure to risk at end points. Additionally, layered security and controlled access to mission-critical documents should become a priority.

3. Find replacements for shadow IT

To keep employee productivity levels high, organisations need to be able to access critical documents from any device, at any time. The modern business world waits for no one, and client expectations for timely delivery of services are on the rise.

Bring-your-own-device plans should follow secure-by-design protocols that allows for flexibility and mobility while ensuring that sensitive business information remains protected and private. Utilising enterprise-level file sharing solutions with consumer-grade UI and UX is one of the best ways to ensure employees remain productive and protected. When an organisations IT-approved solutions are easy to understand and use, employees will be less likely to turn to shadow IT.

4. Deploy additional security measures

Modern businesses cannot work within a vacuum. To be most effective, your data needs to travel – between employees, contractors, executives and other stakeholders. However, the more your data moves, the more opportunities there are for data loss and theft.

In recent years, data loss prevention (DLP) solutions have become more robust, taking advantage of new technologies such as machine learning, artificial intelligence and behaviour analytics. A scalable DLP suite is a good solution for small to medium businesses because it can grow with your company.

Information rights management (IRM) is another highly useful tactic IT managers can rein in data when it goes for a walk. IRM can apply file-level encryption and authorization controls, so you can control who has access to sensitive information. For instance, documents can be restricted to view-only, view- and print-only or fully editable.

5. Develop a preventive strategy

Preventing ransomware and malware attacks is nearly impossible. Walling off employees within a proxy network and deploying firewalls may prevent unskilled attackers from successfully breaching an organisation, but those solutions aren’t enough anymore. Your business needs to be prepared for the worst.

Investing in responsive strategies is the only way to deal with security breaches as they happen. Organisations need to utilise solutions designed to rapidly detect, identify and respond to cyber-attacks as they happen.

Featured

AppDate: DStv jumps on music bandwagon

In this week’s AppDate, SEAN BACHER highlights DStv’s JOOX, Cisco’s Security Connector, Diski Skills, Namola and Exhibid.

Published

on

DStv JOOX

DStv is now offering JOOX, a music streaming service owned by China’s Tencent, to DStv Premium, Compact Plus and Compact customers.

In addition to streaming local and international artists, JOOX allows one to switch to karaoke mode and learn the lyrics as well as create and share playlists. Users can add up to four friends or family to the service free of charge.

DStv Family, Access and EasyView customers can also log in to the free JOOX service directly through JOOX App, but will be unable to add additional friends and won’t be able to listen to add-free music.

Platform: Access the JOOX service directly from the services menu on DStv or download the JOOX app for an iOS or Android phone.

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

 

Cisco Security Connector

With all the malware, viruses and trojans doing the rounds, it is difficult for users and enterprises to ensure that they don’t become targets. Cisco, in collaboration with Apple, has brought out its Cisco Security Connector to protect users. The app is designed to give enterprises and users overall visibility and control over their network activity on iOS devices. It does this by ensuring compliance of mobile users and their enterprise-owned iOS devices during incident investigations, by identifying what happened, who it affected, and the risk of the exposure. It also protects iPhone and iPad users from accessing malicious sites on the Internet, whether on the corporate network, public Wi-Fi, or cellular networks. In turn, it prevents any viruses from entering a company’s network.

Platform: iPhones and iPads running iOS 11.3 or later

Expect to pay: A free download

Stockists: Visit the Apple App Store for downloading instructions.

 

Diski Skills

The Goethe-Institut, in co-operation with augmented reality specialists Something Else Design Agency, has created a new card game which celebrates South African freestyle football culture, and brings it alive through augmented reality. Diski Skills is quick card game, set in a South African street football scenario, showing popular tricks such as the Shibobo, Tsamaya or Scara Turn. Each trick is rated in categories of attack, defence and swag – one wins the game by challenging an opponent strategically with the trick at hand. Through augmented reality, the cards come alive. Move a smartphone over a card and watch as the trick appears on the screen in a slow motion video. An educational value is added as players can study the tricks and learn more about the idea behind it.

 

The game will be launched on 27 October 2018 at the Goethe-Institut.

For more information visit: www.goethe.de

 

Namola

With  recent news of kidnappings on the rise, a lot more thought is going into keeping children safe. Would your child know what to do in an emergency? Have you actually asked them?

Namola, supported by Dialdirect Insurance, is a free mobile safety app. Namola’s simple interface makes it an ideal way for children to learn how to get help in an emergency. All they need to do is activate the app and push a button to get help that they need, even when their parents are not around.

Parents need to install the app on their child’s phone, hold down the request assistance button, program emergency numbers that will automatically be dialled when the emergency button is pushed, and teach their children how and when to use the app.

Platform: Android and iOS

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

 

Exhibid

Exhibid could be thought of as Tinder, but for for art lovers. The interface looks very similar to the popular mobile dating app, in that users swipe left for a painting that doesn’t appeal to them, or swipe right for something they like. Once an art piece is liked by swiping right, one can start bidding or make an offer on it. The bid is automatically sent to the artist. Should he or she accept the offer, the buyer makes a payment through the app’s secure payment gateway and the two are put in contact to make arrangements for delivery.

Platform: Android and iOS

Expect to pay: A free download.

Stockists: Visit the store linked to your device.

Continue Reading

Featured

New kind of business school

At a recent meeting, ALLON RAIZ, founder and CEO of Raizcorp, realised that in order for today’s youth to become entrepreneurs, teachers, the curriculum and the parents need continually expose them to entrepreneurial thinking from a young age.

Published

on

Several years ago, I found myself in a meeting with my business partner and two of my staff members. In front of us was a client who was sharing some of the frustrations in his business. At the end of the meeting, my partner and I were extremely excited about the prospect of two massive opportunities we had both independently identified while listening to the client. My two staff members, on the other hand, completely missed them. This led me to wonder what it was in my own and my partner’s backgrounds that allowed us to so easily spot opportunities while my two staff members remained oblivious … I realised that the difference was that my partner and I both had an early exposure to entrepreneurship while they didn’t.

Not long afterwards, I was delivering a lecture about how Raizcorp grows and develops small businesses at Oxford University’s Said Business School in my role as their Entrepreneur-in-Residence. I mentioned the above incident and spoke about my intention of going into children’s education with a view to providing an entrepreneurial perspective.

One of the professors in attendance asked me if I’d ever heard of a piece of research by Henrich R Greve called Who wants to be an entrepreneur? The deviant roots of entrepreneurship. It’s a pretty unfortunate title but a fascinating piece of research nonetheless. It highlights how certain contexts in childhood result in a much a higher probability of becoming an entrepreneur. For example, kids who participate in solo sports such as tennis or athletics are more likely to become entrepreneurs than children who play team sports like soccer and cricket. Conversely, your mother’s participation in the parent-teacher association has a negative correlation to you becoming an entrepreneur. I spent the rest of the afternoon in the professor’s office discussing other research papers that unequivocally proved that context during your childhood has a massive influence on whether or not you will follow the entrepreneurial route.

Another member of the lecture audience was a double-PhD from the USA who was completing her MBA at Oxford. After the lecture, she approached me and volunteered to help build a framework to incorporate entrepreneurship in the school curriculum without interfering with the formal requirements of the CAPS curriculum.

She spent nine months in South Africa working with me to build out a practical framework. The next phase of the plan was to find the right school at which to embark upon this journey. In December 2015, Raizcorp purchased Radley Private School and we began our entrepreneurial education adventure in earnest in 2016.

At the centre of the Radley philosophy is that the school (the physical building), the teachers, the curriculum and the parents are the “marinade” in which the kids need to soak in order to be continuously exposed to entrepreneurial thinking from a young age. The aim was that if, in future, the kids found themselves sitting in a boardroom with me and my partner, they too would be able to identify the opportunities that we did.

A big shift this year has been the launch of our Entrepreneurial Educator Guide (EEG) programme where we have been training our Radley teachers (whom we call guides) to understand entrepreneurship, business language, business concepts, financial documents and the like. (The EEG training makes use of Raizcorp’s internationally accredited entrepreneurial learning and guiding methodologies.) We have also employed a full-time staff member to ensure that these concepts are imbedded into all lesson plans and classroom activities.

Through my network at Raizcorp, I have been pleasantly surprised by the massive support we’re receiving from prominent entrepreneurs and businesses who want to participate in our Radley Exposure programme, where we take our kids of all ages on visits to different types of businesses so they can understand the difference between retail, wholesale, manufacturing, logistics and so on. Prominent businesspeople have put up their hands to come to the school and tell their stories of hard work, resilience and perseverance. This ties in beautifully with the 17 entrepreneurial concepts that we are instilling into our Radley learners (such as opposite eyes, lateral thinking and opposable mind), while never compromising on our quality academic offering.

As parents, we’ve all heard the terrible statistics about the probability of our kids finding jobs in the future. At Radley, we’re working hard to ensure that our kids have a legitimate and lucrative alternative to finding traditional employment and that is to become an entrepreneur. Radley is all about producing job creators and not job seekers!

To enrol your child or find out more about the school, please visit www.radley.co.za.

Continue Reading

Trending

Copyright © 2018 World Wide Worx