Threat of the month: Network deperimeterization

Share this article:
Threat of the month: Credentials theft
Threat of the month: Credentials theft

What is it?

Increased end-user device mobility decreases the usefulness of network edge security devices and increases the potential for device infection and data loss.

How does it work?

With the ubiquitous use of laptops, smartphones and tablets by corporate users, both in and out of the office, the once hard line that defined the inside of the network has blurred considerably. The average user now has two or more devices that contain corporate information and these devices are commonly used outside the corporate network. The upside is increased worker productivity as an always connected device allows them to be engaged 24/7.

Should I be worried?

If you haven't made preparations, you should be worried. Corporate data, sensitive contracts, product designs and a plethora of other valuable data is walking around in the pockets, purses and briefcases of your end users. The network edge firewalls, data leakage, and other security devices can do little to secure these devices once they leave the corporate network.

How can I prevent it?

  1. Have a plan. Understanding where the data is, and what your policies are for its use, is key. You can't secure what you don't know.
  2. Use cloud-based security tools. Cloud-based web filtering, email and data leakage prevention tools can allow you to secure data transfer no matter where the devices are located.
  3. Train your users.  Set expectations in regard to data security. All devices should be password protected and use data encryption when available. Devices should be registered with services that can be used to remotely delete all data from lost devices.
  4. Retrain. Retrain users often on these policies so that the importance of maintaining diligence in regards to data security is maintained.
  5. Review and revise. Constantly review and revise plans and training as new technologies become available.
Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Threat of the Month

Sign up to our newsletters

TOP COMMENTS

More in Threat of the Month

Threat of the month: Passwords

Threat of the month: Passwords

The argument around the use of passwords and their relevancy today continues to increase.

Threat of the month: Drive-by download

Threat of the month: Drive-by download

The pervasiveness of drive-by downloads has made it our threat of the month for May.

Threat of the month: Linksys router zero-day

Threat of the month: Linksys router zero-day

This month's vulnerability is currently being exploited by a worm known as "TheMoon."