Connect with us

Featured

How to avoid ‘Shadow IT’

Published

on

Shadow IT, or devices that have not been approved by an organisation can allow ransomware to invade an organisation’s network. BRENDAN MCARAVEY, Country Manager at Citrix SA offers some tips on how one can avoid these shady devices.

What is Shadow IT? It is technology used within an organisation without explicit approval — could be aptly terms as the modern Trojan horse! Since these technologies are not IT approved, they have the potential to allow ransomware and malware to invade an organisation’s network, cause data leaks and even introduce compliance risks.

It is critically important to fightback the malware, here are five easy ways to avoid shadow IT:

1. Understand the risks

Part of what makes the threat of shadow IT so insidious is a common lack of knowledge about the problem. More often than not, employees use unsanctioned technology, not for malicious reasons but rather because they are trying to find an intuitive solution for common business tasks. If a company’s existing technology solutions fail to address the needs of its employees, they will be forced to look to consumer-facing products.

It is integral to prevent that from happening and the response should be twofold:

·         Organisations must educate all employees about the risks of shadow IT, and there needs to be an enterprise-level solution that offers ease-of-use as well as advanced cybersecurity protections.

·         IT managers and business owners should develop a plan to pinpoint where employees implement non-IT-approved technology, then develop a strategy for eradicating the problem.

2. Boost your cybersecurity

It seems like nearly every day there’s a fresh headline about a major cyber-attack on a corporation or government office. The most recent local security breach reported was about sensitive information of 30 million South Africans being stolen from the credit bureau. And, prior to that more than six million accounts were at risk when the Ster-Kinekor’s website was hacked.

It is integral for an organisation to have a strategy for security technology that encompasses the virtualisation of applications, desktops and networks, as well as the centralisation of data to avoid exposure to risk at end points. Additionally, layered security and controlled access to mission-critical documents should become a priority.

3. Find replacements for shadow IT

To keep employee productivity levels high, organisations need to be able to access critical documents from any device, at any time. The modern business world waits for no one, and client expectations for timely delivery of services are on the rise.

Bring-your-own-device plans should follow secure-by-design protocols that allows for flexibility and mobility while ensuring that sensitive business information remains protected and private. Utilising enterprise-level file sharing solutions with consumer-grade UI and UX is one of the best ways to ensure employees remain productive and protected. When an organisations IT-approved solutions are easy to understand and use, employees will be less likely to turn to shadow IT.

4. Deploy additional security measures

Modern businesses cannot work within a vacuum. To be most effective, your data needs to travel – between employees, contractors, executives and other stakeholders. However, the more your data moves, the more opportunities there are for data loss and theft.

In recent years, data loss prevention (DLP) solutions have become more robust, taking advantage of new technologies such as machine learning, artificial intelligence and behaviour analytics. A scalable DLP suite is a good solution for small to medium businesses because it can grow with your company.

Information rights management (IRM) is another highly useful tactic IT managers can rein in data when it goes for a walk. IRM can apply file-level encryption and authorization controls, so you can control who has access to sensitive information. For instance, documents can be restricted to view-only, view- and print-only or fully editable.

5. Develop a preventive strategy

Preventing ransomware and malware attacks is nearly impossible. Walling off employees within a proxy network and deploying firewalls may prevent unskilled attackers from successfully breaching an organisation, but those solutions aren’t enough anymore. Your business needs to be prepared for the worst.

Investing in responsive strategies is the only way to deal with security breaches as they happen. Organisations need to utilise solutions designed to rapidly detect, identify and respond to cyber-attacks as they happen.

Featured

Welcome to world of 2099

The world of 2099 will be unrecognisable from the world of today, but it can be predicted, says one visionary. ARTHUR GOLDSTUCK met him in Singapore.

Published

on

Futuristic structures tower over the landscape. Giant, alien-looking trees light up with dazzling colours amid the hundreds of plant species that grow up their trunks. Cosmetic stores sell their wares via public touch-screens, with products delivered instantly in drawers below the screens.

This is not a vision of the future. It is a sample of Singapore today. But it is also an inkling of the world we may all experience in the future.

Singapore was the venue, last week, of the World Cities Summit, where engineers, politicians, investors and visionaries rubbed shoulders as they talked about the strategies and policies that would enhance urban living in the future.

As part of the Summit, global payment technologies leader Mastercard hosted a small media briefing by one of Singapore’s leading thinkers about the future, Dr Damian Tan, managing director of Vickers Venture Partners. The company’s slogan “We invest in the extraordinary,” offers a small clue to Tan’s perspective.

“We look as far forward as 2099 because, as a venture capital firm, we invest in the long term,” he tells a group of journalists from Africa and the Middle East. “Companies explode in growth because there is value in the future. If there is no growth, they won’t explode.”

The big question that the Smart Cities Summit and Mastercard are trying to help answer is, what will cities look like in the year 2099? Tan can’t give an exact answer, but he offers a framework that helps one approach the question.

“If you want to look at 81 years into the future, and understand the change that will come, you need to double that amount and look into the past. That takes us to 1856. The difference between then and now is the difference you can expect between now and 2099.”

Click here or on the page link below to read on: Page 2: Soldiers and Health in 2099.

  •    Arthur Goldstuck is founder of World Wide Worx and editor-in-chief of Gadget.co.za. Follow him on Twitter on @art2gee and on YouTube

New page:

Continue Reading

Featured

Street art goes electric

Kaspersky Lab and British street artist D*Face have unveiled the first-ever “art helmet” design at the Formula E finale for electric cars in New York.

Published

on

The ‘Save The World’ helmets will be raced by DS Virgin Racing’s drivers, Sam Bird and Alex Lynn, as they traverse the New York street circuit during the final races of the Formula E season.

The announcement signals the first art helmet by a Formula E team, continuing the heritage of art in motorsport and the cybersecurity brand’s commitment to contemporary art, creativity and innovation. D*Face took inspiration from Kaspersky Lab’s tagline, “A Company To Save The World”, and hopes that his colourful work will inspire people to take positive action.

D*Face will announce his first-ever art car design with a custom-made livery for the DS Virgin Racing Team. Its design will be released at the “Art Goes Green” event after Saturday’s race. The helmets and art car are the latest installations in the “Save the World” collection, following a major permanent public mural that was installed in Brooklyn, New York, in May.

D*Face, whose real name is Dean Stockton, said: “It is exciting to work with Kaspersky Lab on this project and create art with a real message of hope for a better future. After all, this is our world and we need to look after it. It will take every one of us to make a real lasting, impactful change. I love the mentality of the DS Virgin Racing Team and that of Formula E by showcasing sport in a way that doesn’t harm the environment, but is still just as exhilarating and fun.

“It is time for us all to stand together and make a change… be that stopping data steals, climate change, plastic waste or using damaging fuels. I want everyone to make a pledge to do one thing that will help make a change.”

As a sponsor of DS Virgin Racing Team, Kaspersky Lab is responsible for protecting the team’s devices against cyber threats. The company sees the technical environment in the global sport of Formula E as the next frontier in furthering its research and development of new technologies to keep vehicles secure in the digital world.

Sylvain Filippi, Managing Director at DS Virgin Racing, said: “The whole team fully supports this great initiative and our thanks got to Kaspersky and D*Face for their collaboration. It’s an honour to have such an innovative artist bring his talents to bear in our team ahead of the season-finale; the car, drivers’ crash helmets and mural all look amazing.”

Aldo Fucelli Pessot del Bo, Head of Global Partnerships and Sponsorships at Kaspersky Lab added: “There is a need for innovation on a global scale, both in contemporary art and in the fast-growing sport of Formula E. Now, for the first time ever, Kaspersky Lab is proudly bringing together the two sectors in an effort to Save the World and unleash creativity, encourage freedom of expression and further innovation.”

Continue Reading

Trending

Copyright © 2018 World Wide Worx