Connect with us

Featured

How to avoid ‘Shadow IT’

Published

on

Shadow IT, or devices that have not been approved by an organisation can allow ransomware to invade an organisation’s network. BRENDAN MCARAVEY, Country Manager at Citrix SA offers some tips on how one can avoid these shady devices.

What is Shadow IT? It is technology used within an organisation without explicit approval — could be aptly terms as the modern Trojan horse! Since these technologies are not IT approved, they have the potential to allow ransomware and malware to invade an organisation’s network, cause data leaks and even introduce compliance risks.

It is critically important to fightback the malware, here are five easy ways to avoid shadow IT:

1. Understand the risks

Part of what makes the threat of shadow IT so insidious is a common lack of knowledge about the problem. More often than not, employees use unsanctioned technology, not for malicious reasons but rather because they are trying to find an intuitive solution for common business tasks. If a company’s existing technology solutions fail to address the needs of its employees, they will be forced to look to consumer-facing products.

It is integral to prevent that from happening and the response should be twofold:

·         Organisations must educate all employees about the risks of shadow IT, and there needs to be an enterprise-level solution that offers ease-of-use as well as advanced cybersecurity protections.

·         IT managers and business owners should develop a plan to pinpoint where employees implement non-IT-approved technology, then develop a strategy for eradicating the problem.

2. Boost your cybersecurity

It seems like nearly every day there’s a fresh headline about a major cyber-attack on a corporation or government office. The most recent local security breach reported was about sensitive information of 30 million South Africans being stolen from the credit bureau. And, prior to that more than six million accounts were at risk when the Ster-Kinekor’s website was hacked.

It is integral for an organisation to have a strategy for security technology that encompasses the virtualisation of applications, desktops and networks, as well as the centralisation of data to avoid exposure to risk at end points. Additionally, layered security and controlled access to mission-critical documents should become a priority.

3. Find replacements for shadow IT

To keep employee productivity levels high, organisations need to be able to access critical documents from any device, at any time. The modern business world waits for no one, and client expectations for timely delivery of services are on the rise.

Bring-your-own-device plans should follow secure-by-design protocols that allows for flexibility and mobility while ensuring that sensitive business information remains protected and private. Utilising enterprise-level file sharing solutions with consumer-grade UI and UX is one of the best ways to ensure employees remain productive and protected. When an organisations IT-approved solutions are easy to understand and use, employees will be less likely to turn to shadow IT.

4. Deploy additional security measures

Modern businesses cannot work within a vacuum. To be most effective, your data needs to travel – between employees, contractors, executives and other stakeholders. However, the more your data moves, the more opportunities there are for data loss and theft.

In recent years, data loss prevention (DLP) solutions have become more robust, taking advantage of new technologies such as machine learning, artificial intelligence and behaviour analytics. A scalable DLP suite is a good solution for small to medium businesses because it can grow with your company.

Information rights management (IRM) is another highly useful tactic IT managers can rein in data when it goes for a walk. IRM can apply file-level encryption and authorization controls, so you can control who has access to sensitive information. For instance, documents can be restricted to view-only, view- and print-only or fully editable.

5. Develop a preventive strategy

Preventing ransomware and malware attacks is nearly impossible. Walling off employees within a proxy network and deploying firewalls may prevent unskilled attackers from successfully breaching an organisation, but those solutions aren’t enough anymore. Your business needs to be prepared for the worst.

Investing in responsive strategies is the only way to deal with security breaches as they happen. Organisations need to utilise solutions designed to rapidly detect, identify and respond to cyber-attacks as they happen.

Featured

Smash hits the
Nintendo Switch

Super Smash Bros. delivers what the fans wanted in the latest “Ultimate” instalment, writes BRYAN TURNER.

Published

on

Super Smash Bros. Ultimate, the latest addition to the popular Nintendo Smash series, has landed on the Nintendo Switch with a bang, selling 5-million copies in the first week of its release. The game has been long-anticipated since the console’s release, as many fans consider iy to be a Nintendo staple. And the wait was well worth it.

It features 74 playable fighters, 108 stages, almost 1300 Spirit characters to collect while playing, and a single-player Adventure mode that took about three days (or 28 hours) of gameplay to complete. The game offers far more gameplay than its predecessors, making it the Smash game that gives its players the best bang for their buck.

For those new to the game, the goal is to fight opponents and build up their damage score (draining their health) to knock them off the stage eventually. This makes the game seem chaotic, as many players jump around the platforms as if they were on quicksand, in order to avoid being hit by the other players.

It also services two kinds of players: the competitive and the casual.

Competitive players can be matched on the online service by skill ranking to enjoy playing with similarly high-skilled opponents. This is especially important in e-sports training for the game, and for players wanting to master combos against other human players. The casual gamer is also catered for, with eight-player chaos and button-mashing to see who comes out luckiest. This segment is also important for those wanting to learn how to play.

Training mode is also a place to go for those learning to play. It offers “CPU” players that are graded by intensity to train as a single player to learn a character’s moves, combos and general fighting style. More challenging CPU players can also be used by competitive players to train when there isn’t a Wi-Fi connection available.

Direct Play features in this game, allowing two players with two Switch consoles to play against each other over a direct connection – no Wi-Fi needed. This is especially useful to those who want to have a social gaming element on the go, similar to that of the cable connector of the Gameboy.

Click here to read Bryan Turner review of Super Smash Bros. Ultimate.

Previous Page1 of 3

Continue Reading

Competitions

Win Funko Fortnite in Vinyl

Gadget and Gammatek have nine Funko Fortnite figurines to give away.

Published

on

A Funko Pop figurine based on a character set is indicative of reaching the heights of pop culture. It is no surprise, then, that the world’s biggest online game, Fortnite, has its own line of Funko Pop figurines. The Funkos are modeled on the characters in game, including Drift, Ragnarok, Dark Vanguard, Volar, Tracera Ops, and Sparkle Specialist.

Now, local Funko distributor Gammatek has released the Fortnite figurines in South Africa. To celebrate, Gadget and Gammatek are giving away a set of three Funko Fortnite figurines to each of three readers (9 figurines in total). To enter, first click on your favourite Funko Pop on the next page and post the Tweet that appears. Then, follow Gadget on Twitter.

You can put the tweet in your own words, but entries must have the competition’s hashtag (#FunkoFortnite) and mention @GadgetZA to be considered valid.

Click here to select the Funko Fortnite character you want to tweet.

Previous Page1 of 2

Continue Reading

Trending

Copyright © 2018 World Wide Worx