August 11, 2014
In a world where we’re increasingly vulnerable to cyberattacks through our technology usage (see: Your Android Device May be Vulnerable to Hackers and Recent Cyberattack Calls Device Unlocking Policies Into Question, it’s no question that it’s imperative to ensure solid security practices.
This is especially true for users with company-issued devices or participating in a BYOD program through their employers. As BYOD becomes increasingly widespread in the workplace, employees using personal devices in the workplace could be leaving themselves (and their companies) open to attack – an undeniable reason why BYOD security is essential.
In a recent interview series, Forbes spoke to top “cyber-experts” about avoiding security threats in the digital world.*
While they pointed out that there’s no such thing as a catch-all solution, there are many ways that users and security managers can protect themselves (and in the case of BYOD, their companies) from cyberattacks.
Acknowledge that while everything can be hacked, most malicious cyberattacks target valuable, poorly-protected information. That’s why it’s important to personally take the time to learn the limitations of security tools and strengthen your defenses accordingly.
In today’s world of cloud services and big data, users expect guaranteed safety and security. By showing customers exactly what corporate security programs are in place, companies can also assure privacy and (most importantly) accountability. For companies that make a point to be transparent about data procedures, it’s easy to gain user trust – which could lead to more business in the future.
One expert notes that “with the Internet of Things every company becomes a technology company, and every company becomes a security company.” With cyberattacks running rampant, he recommends implementing solutions that coordinate together, collecting and sharing intelligence to avoid threats.
If a company’s corporate history involves M&As, its systems may be at a higher risk for cyberattack. If Company A acquires Company B, Company A automatically inherits any of Company B’s “cybersins” (i.e. any past security breaches). Thus, all connected systems could be compromised. Executing cyberaudits can prevent this danger.
Encrypting information is becoming more important, especially in the case of online security. A good example is that for any information regarding children, the Children’s Online Privacy Protection Act gives parents the right to control the collection of personal information from their kids. If parents approve the collection, the website or app must provide reasonable security.
Minimize the risk of a cyberattack by minimizing the usage of various apps and programs. Instead, have users work with a single interface (e.g. a browser) to access different programs and perform tasks.
There’s no doubt that mobile security standards are improving. With innovations for the workplace, the availability of single consolidated, centralized systems for mobile and desktop platform/app security is increasing (see: How to Ensure Mobile Security). And as devices improve, BYOD security policies are improving with them. By investing in the best technologies for securing mobile networks, data-center traffic and commonly-used websites and apps, we can revolutionize the tenuous security environment of the internet.
* What To Do About Our Cybersecurity Problems, Forbes. Forbes.com LLC.