Now With Non-Jailbreak Solution for iPhone/iPad - Read more

 

Non-Jailbroken Devices Supported

Best practices to keep business secure

        

In the technology age, many companies and businesses have taken on state-of-the-art applications and software with no hesitation. However, with cloud computing and technology advancing extremely quickly, it is important for employers keep their business information within the company, and that employees or others do not hack into crucial data, according to InformationWeek.

There are a number of ways for companies to maintain good security practices within their companies. First off, it is important to protect the “crown jewels,” which are basically the most important pieces information that company has, the media outlet reports. This is especially imperative in the unfortunate event of an employee leaking information. Installing encryption software is advisable along with monitoring anyone who has access to the file.

It is also important inform employees that employee monitoring software has been put in place. This way, the workers may shy away from any illegal behavior, according to the news outlet. Additionally, terminations and resignations mean an increased risk of insider crime, especially if the employee left on bad terms, so it is imperative to keep an eye out for at least a month after the employee is gone.

“The good news about [insider] crime, theft of intellectual property, is that most people who steal it do [so] within 30 days of resignation,” Dawn Cappelli, who works at Carnegie Mellon University’s CERT Insider Threat Center, told the news source. “Know what your crown jewels are. If someone resigns who had access to your crown jewels, you need to go back and proactively investigate that.”

In some cases, businesses do not need to worry about insider crime, because they are more concerned with losing control of their data through all of the applications and software. According to NetworkWorld, many owners are realizing they do not have a hold on the data which is stored in software-as-a-service (SaaS) applications because they simply have too many.

“Because it’s being done outside of IT, the kind of discipline and access control best practices do not normally get done,” Jackie Gilbert, president and co-founder of SailPoint, which brings applications back into company policy, told the news source. “The more SaaS applications that an organization starts to adopt, the more they start to see security weaknesses crop up.”

        

Recommended

Leave a Comment


one × = 5

Optimized by SEO Ultimate