Threat of the month: Network deperimeterization
Threat of the month: Credentials theft
What is it?
Increased end-user device mobility decreases the usefulness of network edge security devices and increases the potential for device infection and data loss.
How does it work?
With the ubiquitous use of laptops, smartphones and tablets by corporate users, both in and out of the office, the once hard line that defined the inside of the network has blurred considerably. The average user now has two or more devices that contain corporate information and these devices are commonly used outside the corporate network. The upside is increased worker productivity as an always connected device allows them to be engaged 24/7.
Should I be worried?
If you haven't made preparations, you should be worried. Corporate data, sensitive contracts, product designs and a plethora of other valuable data is walking around in the pockets, purses and briefcases of your end users. The network edge firewalls, data leakage, and other security devices can do little to secure these devices once they leave the corporate network.
How can I prevent it?
- Have a plan. Understanding where the data is, and what your policies are for its use, is key. You can't secure what you don't know.
- Use cloud-based security tools. Cloud-based web filtering, email and data leakage prevention tools can allow you to secure data transfer no matter where the devices are located.
- Train your users. Set expectations in regard to data security. All devices should be password protected and use data encryption when available. Devices should be registered with services that can be used to remotely delete all data from lost devices.
- Retrain. Retrain users often on these policies so that the importance of maintaining diligence in regards to data security is maintained.
- Review and revise. Constantly review and revise plans and training as new technologies become available.