Connect with us

Featured

How to avoid ‘Shadow IT’

Published

on

Shadow IT, or devices that have not been approved by an organisation can allow ransomware to invade an organisation’s network. BRENDAN MCARAVEY, Country Manager at Citrix SA offers some tips on how one can avoid these shady devices.

What is Shadow IT? It is technology used within an organisation without explicit approval — could be aptly terms as the modern Trojan horse! Since these technologies are not IT approved, they have the potential to allow ransomware and malware to invade an organisation’s network, cause data leaks and even introduce compliance risks.

It is critically important to fightback the malware, here are five easy ways to avoid shadow IT:

1. Understand the risks

Part of what makes the threat of shadow IT so insidious is a common lack of knowledge about the problem. More often than not, employees use unsanctioned technology, not for malicious reasons but rather because they are trying to find an intuitive solution for common business tasks. If a company’s existing technology solutions fail to address the needs of its employees, they will be forced to look to consumer-facing products.

It is integral to prevent that from happening and the response should be twofold:

·         Organisations must educate all employees about the risks of shadow IT, and there needs to be an enterprise-level solution that offers ease-of-use as well as advanced cybersecurity protections.

·         IT managers and business owners should develop a plan to pinpoint where employees implement non-IT-approved technology, then develop a strategy for eradicating the problem.

2. Boost your cybersecurity

It seems like nearly every day there’s a fresh headline about a major cyber-attack on a corporation or government office. The most recent local security breach reported was about sensitive information of 30 million South Africans being stolen from the credit bureau. And, prior to that more than six million accounts were at risk when the Ster-Kinekor’s website was hacked.

It is integral for an organisation to have a strategy for security technology that encompasses the virtualisation of applications, desktops and networks, as well as the centralisation of data to avoid exposure to risk at end points. Additionally, layered security and controlled access to mission-critical documents should become a priority.

3. Find replacements for shadow IT

To keep employee productivity levels high, organisations need to be able to access critical documents from any device, at any time. The modern business world waits for no one, and client expectations for timely delivery of services are on the rise.

Bring-your-own-device plans should follow secure-by-design protocols that allows for flexibility and mobility while ensuring that sensitive business information remains protected and private. Utilising enterprise-level file sharing solutions with consumer-grade UI and UX is one of the best ways to ensure employees remain productive and protected. When an organisations IT-approved solutions are easy to understand and use, employees will be less likely to turn to shadow IT.

4. Deploy additional security measures

Modern businesses cannot work within a vacuum. To be most effective, your data needs to travel – between employees, contractors, executives and other stakeholders. However, the more your data moves, the more opportunities there are for data loss and theft.

In recent years, data loss prevention (DLP) solutions have become more robust, taking advantage of new technologies such as machine learning, artificial intelligence and behaviour analytics. A scalable DLP suite is a good solution for small to medium businesses because it can grow with your company.

Information rights management (IRM) is another highly useful tactic IT managers can rein in data when it goes for a walk. IRM can apply file-level encryption and authorization controls, so you can control who has access to sensitive information. For instance, documents can be restricted to view-only, view- and print-only or fully editable.

5. Develop a preventive strategy

Preventing ransomware and malware attacks is nearly impossible. Walling off employees within a proxy network and deploying firewalls may prevent unskilled attackers from successfully breaching an organisation, but those solutions aren’t enough anymore. Your business needs to be prepared for the worst.

Investing in responsive strategies is the only way to deal with security breaches as they happen. Organisations need to utilise solutions designed to rapidly detect, identify and respond to cyber-attacks as they happen.

Featured

Broadband gets a helping hand

Behind this week’s news that MTN fibre provider Supersonic has launched a fixed LTE service is an effort to rethink home connectivity, writes ARTHUR GOLDSTUCK

Published

on

This week, MTN made its biggest play yet into the market for fibre connections to homes, but its biggest impact may well be within the home.

The mobile operator’s fibre-to-the-home subsidiary, Supersonic, launched a Fixed LTE offering on a month-to-month basis, meaning that homes in areas not yet wired for fibre can receive high-speed broadband. More important, they can get that access at rates that seem unprecedented for mobile data. 

There are two differences from regular packages, however. For one thing, the SIM card that comes with the package only works in specific routers that have to remain plugged into a power supply. For another, the data allocation is split half-half between regular hours and a Night Owl timeframe: the hours between midnight and dawn.

“It just needs users to adjust their internet behaviour a little,” says Calvin Collett, MD of Supersonic. “Conducting massive mobile phone updates or downloading an entire library of Netflix content shouldn’t be prioritised during the day, but should be scheduled for Night Owl data consumption.”

The biggest benefit, aside from pricing, is that one does not have to wait for fibre to arrive in a specific area. While Supersonic’s core business is fixed-line fibre-to-the-home, it is now set to leverage its parent company’s massive mobile data network.

“MTN’s LTE network coverage sits at 95%, after billions of rand was invested in network upgrades in recent years. There is absolutely no reason why those waiting for a fibre connection shouldn’t move to Fixed LTE.”

Collett argues that consumers are far more savvy and well informed of developments in the telecoms space than observers think. They carefully investigate the products and services they choose to spend on, and are looking for the best deals available.

The result is that Supersonic has quietly built up a side business in installing what is called a Mesh Wi-Fi network, consisting of a main Wi-Fi router connected to the standardfibre or LTE or router, and a series of additional access pointscalled plumes, placed in areas of low coverage through ahome.

The plumes – small pods that plug into any power point –connect to one another to expand the network across a wide area. Where traditional WI-FI extenders lose up to half the fibre bandwidth with every extension, the plumes maintain most of the speed regardless of how far the network is extended. All the pods connected to the same router form a single network with the same network name, eliminating the complications Wi-FI extenders usually introduce.

“The traditional Wi-Fi router has replaced the dial up connection, and we’re all happy about this – the infamous dial up tone is ingrained in the brains of anyone over the age of 30,” says Collett. “Wi-Fi revolutionised our way of life as the router gave us access to the internet without directly connecting to a modem. 

“We’ve moved forward, transitioning from ADSL to fibre. While fibre allows for high speed internet access, it is still connected to your Wi-Fi router. Naturally, the further you move away from the hub, the poorer your internet connection will be. Those dead spots around the house can become frustrating when your Wi-Fi signal shows 1 bar and it takes 5 minutes to load a single web page. Mesh Wi-Fi is the solution.”

Collett says he specifically researched a product that looked good, offered app-based management and required no cables. His research led him to Silicon Valley, and the result is the Supersonic Plume Mesh network system.

The drawback is that installation can be complicated for the non-technical consumer. To plug the gap, so to speak, Supersonic sends out technicians who conduct a Wi-Fi sweep of a home and advise how many Plume devices will be needed for 100% coverage. Based on this the technicians make a recommendation for an optimal “smart Wi-Fi”solution. Once installed, though, the network can be monitored and managed from a Supersonic App.

We tried it out and found it was a tale of two experiences. The initial experience was frustrating, as the pods tried to find each other. This is a necessary evil, it seems, as the Plume Mesh network optimises itself over a period of several days. That means the experience at the edge of the network can be very poor at the time of installation. After a few days, however the network was flying.

With a 100Mbps line, the experience next to the main router was around 105 Mbps, both up and down. That in itself was something of a marvel. But the biggest impact was felt at the furthest point from the router: where a Wi-Fi extender had previously delivered speeds of below 10Mbps, download speeds of 80Mbps became not only commonplace, but almost taken for granted.

One of the most useful features of the Plume Mesh is the level of monitoring offered through the Supersonic app. One can observe exactly what devices are connected to which pods – each is given a name, typically of the room, that is visible only through the app.

The biggest surprise of the plume solution is that it has not become a standard solution for Wi-Fi networks everywhere. In an era when we have become deeply dependent on a decent Wi-Fi signal, it has become a necessity rather than a luxury. As a result, home connectivity should be taken far more seriously than merely fobbing consumers off on low-performance extenders. 

MTN seems to have taken this message to heart, rethinking its own approach to home usage.

“Internet access has become the third utility behind electricity and water,” says Collett. “Our goal is to ‘own the home’ but not just by connecting a bunch of devices to a central point. It’s really about how these devices can pioneer habitual change in the home that’s convenient and saves valuable time and money.”

Click here to read about SuperSonic’s pricing.

Previous Page1 of 2

Continue Reading

Featured

Location data key to transforming SA’s transport system

Published

on

Location technology can transform South Africa’s transport system – but don’t expect to see self-driving cars on our roads any time soon. What’s more relevant is the need for the public and private sectors to work together more closely to unlock the significant social and economic benefits that more efficient transport and mobility systems would bring to the country, including less congestion and fewer road accidents. 

That was the message from Michael Bültmann, Managing Director, in charge of international relations  atHERE Technologies, a global leader in mapping and location platform services, at an event hosted by the international law firm Covington & Burling in Johannesburg last week, to discuss how digitization could support better mobility, safety and integration in South Africa. 

“Society needs to solve some fundamental challenges, and relevant location data can play a key role in creating a better future for mobility in South Africa. If we know where the goods and people are, and how and why they move, we have the basis for a system that matches demand and supply far more closely, and uses our transport infrastructure more efficiently,” saidBültmann.

“But no company, government or individual can do it all themselves. It’s all about collaborating. If we get real-time data use right, it would have a profound effect on the way the entire economy works: less congestion, fewer accidents, more efficient use of vehicles and public transport, less air pollution, greater quality of life, and potential savings of billions of rands in fuel, time and safer roads.”

Speaking at the event, the CSIR’s Dr Mathetha Mokonyama said that despite the billions of rands pumped into the country’s mass public transport network in recent years, 90% of commuter seats available are still provided by either cars or taxis.

“We have the right to dignity. If you want to see indignity, look at people getting up at 2am to get unreliable transport to a job that only pays R3500 a month. In our country, access to transport is critical for people to make a living, and our focus as a country should be to implement an equitable and just transport system that caters to all sectors of society,” he said.

“It was a pleasure to support the event that brought together so many viewpoints on the question of the effective use of data and location intelligence to enhance the mobility of goods, people and services,” said Robert Kayihura, senior advisor in Covington’s Johannesburg office.  “While the harmonization of regulatory regimes around the continent will take time, a key takeaway from our discussions is the critical need to build a shared vision of the future through consistent public-private dialogue and collaboration in order to accelerate and ensure the sustainable and safe digitization of Africa.”

Paul Vorster, the chief executive of the Intelligent Transport Society of SA (ITSSA), said the effective sharing of data between metros, government and the private sector would ‘go a long way’ to improving the efficiency of existing transport infrastructure.

“The starting point is to improve what we already have. Once we know what we have – that is, data – we can start solving real problems, like knowing where the demand and supply are. But to do this, metros will need to learn from each other, and they often face political hurdles in the process,” he said.

Bültmann said increasing levels of urbanisation across the world were creating the need for cities to better predict, manage and plan future urban movement. Combining and analysing data from different, complementary sources could help South African cities to improve urban planning, relieve congestion and curb pollution for better quality of life.

The event was also attended by Presidential Investment Envoy Phumzile Langeni, the National Planning Commission’s Themba Dlamini; SANRAL’s Alan Robinson; and Dr Rüdiger Lotz, the Deputy Head of Mission at the German Embassy. The guests were welcomed by Witney Schneidman, the head of Covington’s Africa practice and former Deputy Assistant Secretary of State for African Affairs (1997-2001) in the U.S. Government.

Continue Reading

Trending

Copyright © 2019 World Wide Worx