VPN Functionalities for Remote Access Technology: Fact or Fiction? Part 2

Posted by Tobias Eichenseer Thu, 16 Oct 2014 13:27:00 GMT

In our earlier post on remote access technology, we discussed various aspects of VPN (virtual private network) technology. This article will further examine how VPNs offer staff and business partners a reliable and secure connection to highly-sensitive company resources using unsecure connections, such as the internet.

1. VPNs Play an Important Role in Mobile Workplace Strategy Deployment

Fact.
VPN technology is a vital part of a mobile workplace strategy. VPNs allow an employee to gain access to the corporate network with the same speed and controls as their in-office counterparts. Modern VPNs are so reliable that a growing number of network managers are choosing to deploy VPNs even when the employee is in the office. This strategy is a reasonable approach if employees use their personal mobile devices on the company site. In this case, the access via VPN on site prevents viruses and other malware from compromising the company network, and can also prevent employees from establishing a second Internet connection whilst being connected to the company network (anti-split tunneling). These security measures help overcome the security risks so that employees can benefit from anywhere and anytime access.

2. VPN Connections Fail Frequently and Require Repeat Log-ins

Fiction.
VPNs offer high availability and single sign-on techniques to ensure that users can connect to a multitude of services by only entering their password once. VPNs present in the market resume automatically after a loss of connectivity rapidly and without the need of user intervention. Some VPNs also ease network roaming. For instance, an employee’s authenticated state may be kept during a brief loss of connectivity, or reinstated transparently via single sign-on. Furthermore, today’s solutions ensure that data are not lost in the case of a connection interruption.  


3. Once an Employee has Remote Access, He or She Can Access the Company Resources Forever

Fiction
Network managers can prohibit employees’ access to the company resources once employment is terminated. Modern VPNs facilitate this process by allowing central administration and configuration.
Furthermore, while the employees are working for the company, IT administrators can define roles and rights for each user – this also includes the possibility to completely deny access from an external site under a specific situation, such as in the case that an employee wants to access data from a public Internet café. This ensures that each user can only view and access the data he or she is intended to.

4. VPNs Management Policies are Difficult to Administer

Fiction.
To simplify administration, VPNs can use central policy managers and integrate with enterprise authentication servers and directories. Given the multiple access methods, endpoint security checkers and other policies, it is possible that policies may become cumbersome. It is up to the network administrator to use his or her authority sensibly to achieve the desired security level without rendering the VPN challenging to manage. Today’s VPNs are relatively simple to manage and give network managers various options that ensure that users gain only access to appropriate information.

Remote Access: The Future of the Workforce
Remote access technology has vastly improved since its inception, and organizations are increasingly deploying VPN technology, benefitting from enhanced security features whilst being user-friendly.

If you are looking for a performant and innovative remote access solution, we can recommend you our Remote Access Suite HOB RD VPN. HOB RD VPN is the comprehensive solution for remote access to your central data and applications, at any time and from anywhere, with almost any end device. As a pure software solution, HOB RD VPN is highly scalable and supports many different platforms.

Moreover, we would like to invite you to download our free e-book: Debunking Myths about Remote Access Technology. It contains useful information about the advantages of remote access solutions and showcases how you can benefit from implementing a remote access solution in your company.

no comments |

Meet the Green Cloud: How Cloud Computing Supports Green IT

Posted by Tobias Eichenseer Thu, 25 Sep 2014 15:08:00 GMT

The unprecedented amount of media coverage on concerns over global warming, energy conservation, social responsibility and all things “green” is an eye-opener for everyone. For businesses, environmental issues are a consideration of most IT strategies. But what role does cloud computing play in shouldering social responsibility and supporting green IT computing?

What is Green IT?
The objective of Green IT is to use computers and IT resources in a more efficient and environmentally responsible way. In today’s highly technological world, businesses are becoming more and more reliant on staff working on different computing devices – desktops, laptops, tablets and smartphones – all day, which are connected to the corporate network. This is compounded by the fact that virtually all organizations are increasingly handling larger amounts of data that is critical to their business.

Social Responsibility in the Business World
At the operational level, enterprises are also striving to adhere to environmental directives. In the United States, Public Law 109-431 is now effective. Its aim is “to study and promote the use of energy efficient computer servers in the United States”.

Cloud Computing
Access to data anywhere and at any time is important to enhance the usability of the data. Disparate storage is inefficient; from the business perspective, assets are generally underutilized, resulting in waste of capital investment in storage infrastructure. From the environmental perspective, this leads to unnecessary consumption of power, cooling and space resources.
Cloud computing meets both of these requirements, and maximizes efficiency without hindering on productivity. The eco-friendly solution of cloud computing reduces management complexity by reducing the number of storage devices, centralizing administration and policies, and enhances security and control.
   
Scalable Computing via Pure Software Remote Access
Organizations can save power by using “server-based computing”, or thin-clients to cater to all parts of the business. A pure software VPN solution provides the most scalability, while simultaneously reducing the cost of IT staffing via decreased internal maintenance and upgrade and support costs. A thin-client computer using a simple Web browser with remote desktop virtualization software can save up to approximately double the energy of a standard desktop loaded with its own dedicated applications. In this case, the applications can be accessed on demand from a remote server from any location via the cloud.

Going Green
By moving sensitive data into the private cloud, organizations can become greener while simultaneously reducing costs. This prevents staffs’ obligation to use inefficient and time-consuming filing cabinets and copying/printing endless paper documents for themselves or for others. Businesses can make such documents available electronically by storing them securely in the cloud; employees can access them from any location at any time. This saves on paper and ink, and decreases printer carbon emissions.

What’s your opinion about Green IT? Please share your thoughts with us in the comments below.

no comments |

How to Avoid Becoming a Victim of a Mobile Phishing Attack

Posted by Tobias Eichenseer Thu, 18 Sep 2014 15:38:00 GMT

The dependence on mobile browsers to accomplish security sensitive operations is increasing. With this comes an increase in mobile cyber threats, as cybercriminals are now moving beyond computers and shifting to mobile handheld devices.

A phishing survey reported that the number of phishing targets increased from 2012 to 2013, indicating that e-criminals are spending time looking for new opportunities. Mobile phishing occurs when identity thieves collect the user's information, including financial or account information such as user name and password, Social Security Number, date of birth, and credit card information from mobile devices, for the purpose of committing fraud or other illegalities.

Limitations of Mobile Devices
Specific limitations of the mobile platform make mobiles susceptible to phishing attacks:

1.    The mobile device’s much smaller screen size constrains the ability of the mobile browser to entirely display any anti-phishing security elements a website may contain. Most mobile browsers in use today simply lack any room to incorporate security indicators and certificate information that alert users of site identity and the presence of strong cryptographic algorithms, as is done with their desktop counterparts. This leaves users unable to verify whether the website they are logging into is legitimate or not; a critical security flaw rendering mobile browsers unsafe. 
    
2.    The permanent default browsers preinstalled on certain phones are another limitation. Their ability to automatically start up and display links the user opens makes it less difficult for cybercriminals, who can now focus on only one browser to exploit.

This combination of a radically reduced screen size and absence of security indicators makes it difficult for users to determine the security standing of mobile browsers, and makes mobile browsing more dangerous for average users, since it provides a false sense of security. Research has shown that mobile browser users are three times more likely to access phishing sites than users of desktop browsers. 

Advantages of Mobile Devices:
However, the mobile platform also has some benefits that reduce the concern of mobile phishing: 

1.    The mobile platform allows phishing targets, including online shopping and banking sites, to develop their own apps for customer use. Assuming there are no spoofed apps and there is a mechanism for constant updates, these legitimate apps facilitate more secure exchanges of information between organizations and their customers.

2.    Mobile browsers are increasingly becoming more powerful, and are able to process and run complex scripts. Websites that involve login details may take advantage of this fact to implement better security measures.

Protection Against Mobile Phishing

One can prevent mobile phishing from taking place by adopting and following the following best practices:

1.    Avoid opening links in emails, especially from suspicious or unknown senders. One should always verify the legitimacy of the email messages received.

2.    Utilization of official apps. If the website one is trying to log in to has an official app, one should use it rather than the browser.

3.    Checking the permissions of all the downloaded apps. One should exert extreme caution when choosing which apps to download, as some apps may be requesting too much data, which could result in a violation of privacy.

4.    The URLs of the websites one visits should be manually typed in and subsequently bookmarked for future visits. This procedure eliminates typographical errors in the URL that can be directed to a phishing website.

5.    Installation of a security solution. Modern solutions for mobile devices enable secure access to data located in the corporate network, without the data ever being downloaded to the device. This eliminates the risk of phishing.

Conclusion
The direction of cybercrime is shifting towards the “post-PC” era, as cybercriminals follow where the users and their money go. Cyberattacks on mobile devices can be prevented by adopting mobile computing best practices.

no comments |

Successful Home Offices Need the Right Management System and IT Infrastructure

Posted by Stefanie Kober Tue, 09 Sep 2014 12:26:00 GMT



In today’s culture, flexible work is quickly becoming the norm. This type of working arrangement is preferred by workers, with 72% of employees stating that flexible work arrangements causes them to choose one job over another *.

Ideally, a company or organization has a single performance appraisal for all employees, independent of where they are located. This implies that the basis for evaluation is the same amongst all workers, without any differentiation between on-site and remote workers.

Management by Objectives
In the 1950s, Peter Drucker invented the concept of “management by objectives” (MBO), whereby he explained that if the overall goals are to be achieved, each job in the company must contribute to the objectives of the whole organization. Workers are evaluated based on performance, rather than their physical location. This change in the style of leadership and corporate infrastructure leads to an increase in productivity, as the sheer physical presence is no longer defined as a positive accomplishment. It also clarifies the type of performance the organization requires of the employees, while simultaneously accentuating and rewarding good performance. Entrepreneur David Heinemeier Hansson states that the most important thing for remote work to succeed is creating a culture where the work itself matters.

Teleworking Programs Best Practices
Although employees are in different places, the work required remains the same. Nonetheless, remote working requires redesigning business processes, employing alternative technologies, and changes in managerial operations and communications.

Managing Remote Workers
An effective remote manager is no different than one who manages employees on-site; clear objectives and rules should be established, and the manager should know his or her employees. It is necessary that a performance evaluation process focuses on defining and tracking goals, achieving results, building leadership effectiveness, and driving employee engagement.

When managing home offices, management by objectives is advisable, as the work outcome is rewarded, rather than simply monitoring the employees’ activities via direct observation.

IT Infrastructure
For a successful teleworking program, data needs to be stored digitally, such that it can be accessed and processed virtually from anywhere. In addition to going paperless, the usage of mobile devices such as laptops enables people to work from wherever they are.

Therefore, apart from an adequate management system, remote working requires implementation of the right IT infrastructure. In order to accomplish this, the following major components of user-access management must be analyzed:
 

  • Users — defining the authorized users within and outside the organization
  • Assets — defining what needs to be protected by the organization and
  • Privileges — delineating which users require access to particular assets, and to what extent


Technology tools enable remotely located employees to access all (or selected amounts) of the company’s resources and software, such as applications, data and e-mail. Employees in home offices are connected via a networking infrastructure, enabling a company with a distributed workforce to securely connect its workers and teams; they also have the ability to share files securely and access the company’s databases, file sharing and telecommunications. This allows for:
 

  • Web-based remote access
  • Safe and secure mobile device connection to enterprise data and 
  • Wireless networks within company facilities


Deployment of Collaborative Technologies

High quality communication is of vital importance, particularly with remote workers. Affordable software-based collaborative tools increase productivity and effectiveness. These include:

 


Remote Access Choices
Remote access is rapidly becoming the preferred connectivity method for various business roles using several types of company or employee-owned devices. So a remote access solution must be flexible, secure and compatible with the anytime/anywhere resource access model and, ideally, no data is saved locally on the end device at any time. Thus, in the event that the device is lost or stolen, problems of data falling in the wrong hands are avoided.

Technological hurdles need no longer be a barrier to implementing work from home policies, which is also made more attractive for enterprises by the shift from managing employee presence to managing employee output/performance. This shift from central-office-centric work, to more flexible home-office work, is expected to continue to increase.

If you would like to find out more about home offices and best practices for remote access solutions, and also learn more about comprehensive company resource protection, please download this free eBook, Home Offices Made Easy.


Sources:
*The Edge Report - Robert Half International Survey, 2008, as cited by Jason Gregg, Tell Your Staff to Go home! The Complete Guide to Telecommuting: books.google.com/books?isbn=1619793628


Author: Hazel Farrugia
 

no comments |

VPN functionalities for remote access technology: Fact or Fiction?

Posted by Stefanie Kober Thu, 14 Aug 2014 09:33:00 GMT



In the mid-1990s, virtual private network (VPN) technology was introduced by Microsoft, such that a secure connection could be created between a computer and a remote server. Since then, remote access technology has evolved to meet modern-day demands and overcome the shortcomings of the early versions of VPNs.
Remote access technology securely connects employees, customers and even partners with the company’s sever using the internet and/or intranets, including local area networks (LANs), as well as wide area networks (WANs).
Although VPN technology is essential in providing comprehensive security, safety and flexibility to businesses, in particular those which opt for the management practice of BYOD (Bring Your Own Device) and/or work from home, some individuals and companies remain skeptical of this technology. 
This article separates fact from fiction.

Fact or Fiction?

1.) VPNs do not affect the performance of the device
Fact.

Modern remote access solutions do not require any software to be downloaded onto the device, thus it cannot affect the device’s performance. Essentially, the device does not need to be “known” on the company network, as the VPN parameters used to log in these devices are configurable by the IT team.

2.) SSL VPNs support web and browser applications only
Fiction.

Early SSL VPNs began as HTTP proxies, enabling user access to web applications through a VPN gateway using an ordinary browser. Today, VPNs offer a variety of access methods, ranging from thin-client SSL tunneling to clientless browser interfaces. Today’s high-quality VPNs also offer browser-launched thin clients which can support virtually any application by tunneling non-web protocols over SSL. Moreover, VPNs also enable users to access Windows Terminal Servers and applications residing there, and further resources, such as file servers, desktop PCs or the company’s intranet.  

3.) VPNs only allow access to the organization’s data

Fiction.

Advanced VPN technology provides various services which help users maintain access to critical information. For instance, modern VPN technology includes remote VoIP capabilities, enabling employees to use the same work telephone number outside of the office.

4.) VPNs are different from other portals
Fact.

VPNs can supply highly-personalized portal views that are a function of each user’s individual access rights. Today’s VPNs provide dynamic access portals, whereby network managers can define server access with application publishing in such a way that the user only sees his or her personal, customized portal.

Summary
Remote access technology has come a long way. In an era where businesses are concerned with security breaches and unauthorized data access, VPNs continue to offer a highly reliable, fast and consistent approach to securely access data and applications stored in the company’s network, anytime and anywhere.

Readers, what are your thoughts on remote access technology? Please share in the comments below.

If you would like to explore more benefits of remote access technologies and learn useful tips for VPN solutions, download our free e-book: Debunking Myths about Remote Access Technology

Author: Hazel Farrugia

no comments |

8 Things to Learn from a Data Breach Study (Part 2)

Posted by Stefanie Kober Tue, 12 Aug 2014 12:42:00 GMT



In our previous post on IT security, we discussed four key findings from a data breach study conducted by Ponemon Institute. In this article, we will further discuss these four key findings and outline preventative measures to avoid security breaches.

Key Findings (Continued)

5.    Cybercrime Costs Differ by Company Size, but Smaller Organizations Sustain a Significantly Higher Cost than Larger Organizations

While everyone is vulnerable to cyber-attacks, smaller organizations are more at risk. A common cyber-attack is the theft of sensitive data, and for a small organization, the loss of project files or customer databases can put them out of business.

Smaller companies (employees<20) should implement a VPN for secure connectivity anytime, anywhere. Due to their ease of use and versatility, SSL VPNs are well-suited for small companies allowing users to only access specific applications and services, and providing access to Web applications, Windows Terminal Servers and their applications or internal network connections.

6.    Information Theft, Followed by the Costs Associated with Business Disruption, Represent the Highest External Costs


Annually, information loss and business disruption (or lost productivity) account for 43% and 36% of external costs, respectively. (In the context of this study, an external cost is one that is created by external factors, including fines, marketability of stolen intellectual properties and litigation)

Setting up strong network security is therefore crucial. Increasingly, more organizations are adopting SSL VPNs, which ensure a secure network connection through the use of encryption, single-sign on options, and firewalls.

In order to minimize costs associated with business disruption, it is imperative that all organizations have a contingency plan in place that outlines how to contain and recover from a substantial security breach. The IT staff must quickly solve the issue, hopefully restoring data from backup files, and returning systems to service without any significant downtime. Nonetheless, any downtime can be disastrous in the case of mission critical systems. 

7.    Recovery and Detection are the Most Costly Internal Activities


Combined, recovery and detection account for 49% of the total internal activity cost per year; cash outlays and labor account for most of these costs. This highlights the importance of back-ups. A data-backup policy is especially important if the organization has several laptops or other mobile devices that can be lost or stolen. To avoid data theft from loss or stolen mobile devices, no data should be downloaded to the device, but rather all data is completely and securely located in the central corporate network.   

8.    A Strong Security Policy Minimizes the Cost of Cyber Attacks


As expected, businesses that invest in a strong security policy and system are better off than their counterparts. This stresses the importance of a strong security policy, which provides the plan for the overall security program adopted by the organization.

Conclusion

As cybercriminals have become more sophisticated in their tactics, fighting cybercrime has become increasingly challenging for organizations worldwide. Although sustaining an organization’s security posture or compliance with standards, policies and regulations also comes at a cost, the benefits of strong security measures outweigh the plausible costs incurred by cyber-attacks.

Author: Hazel Farrugia

no comments |

8 Things to Learn from a Data Breach Study (Part 1)

Posted by Stefanie Kober Thu, 07 Aug 2014 13:00:00 GMT



Recently, the sophistication of cyber-attacks has grown significantly. Cybercriminals are specializing and sharing intelligence so as to steal sensitive data and disrupt critical business functions. Consequently, the topic of cybercrime has been kept top of mind as the repercussions of a cyberattack are costly and potentially very damaging.   

Key Findings
The study, 2013 Cost of Cyber Crime Study: United States, was conducted by the Ponemon Institute and sponsored by HP Enterprise Security Products.

1.    Cybercrimes are Still Costly for Organizations

The average annual cost of cybercrime per organization was $11.6 million, an increase of 26% over the average cost reported in 2012. Considering this increase in cost, IT security should be a top priority for all organizations, as there is no single failsafe solution to protect against cybercrime.

2.    All Industries are Susceptible to Cybercrime

The average annual cost of cybercrime appears to differ according to industry segment; organizations in financial services, defense, and energy and utilities experience markedly higher crime costs than organizations in retail, hospitality and consumer products. The organizations facing higher security threats are not only at risk for financial loss due to cyber-attack, but are also more vulnerable to phishing attacks that could compromise sensitive customer data such as credit card, bank account and social security numbers.

3.    Denial of Service Attacks, Malicious Code and Web-based Attacks are the Most Costly Cybercrimes

These are responsible for more than 55% of all cybercrime costs to organizations. Denial of Service (DoS) is an attack which renders information or data unavailable to its intended recipients. Organizations using VPNs can mitigate such risks by configuring access control lists, a method of defining access rights according to user (such as a file directory or individual file).
Malicious code is a piece of executable code designed to harm a computer or its information, or prevent normal computer operations. Malicious code can come from various sources, such as the Internet, infected diskettes, files received via electronic mail, and worms that exploit several system vulnerabilities. It could also be introduced via a disgruntled insider, who has physical access to a computer or network.
A multilevel strategy is required to effectively defend against malicious code, including physical security, password management, product selection, configuration and maintenance, user awareness and education, up-to-date anti-virus software for servers, clients, and electronic mail and adequate system backups.       Web-based attacks focus on an application itself, as application vulnerabilities could provide the means for malicious end users to breach a system's protection mechanisms. Generally, such attacks take advantage or gain access to private information or system resources. To mitigate Web-based attacks, firewalls, reverse proxies, and intrusion detection and prevention systems (IDPS) should be used, which actively monitor for attacks and attempt to block or change the environment, thus preventing further attacks from reaching the protected application or system. 

4.    Cyber-attacks Can Be Costly if Not Resolved Rapidly 

The results show a direct and positive relationship between the time required to contain an attack and the organizational cost. The results also demonstrate that both the cost and the time taken to resolve an attack increased from the previous year. Failure to resolve the problem quickly leads to prolonged business disruption and gives competitors a distinct advantage.

Conclusion

The results of the study reveal that no one is immune cyber-attacks, which have the potential to inflict significant financial and reputational damage to the targeted organization. Stay tuned for Part 2 where we shall further discuss the findings of this data breach study and how organizations should protect themselves from becoming a victim of cyber-attacks.
  
Author: Hazel Farrugia

no comments |

3 Main Security Concerns as revealed by HOB Remote Access Study

Posted by Tobias Eichenseer Tue, 05 Aug 2014 13:56:00 GMT

Remote access solutions are gaining prevalence as organizations are adopting the mobile workforce strategy, benefitting from increased productivity and reduced expenses. When evaluating and planning a VPN solution, it is essential to understand the security risks that are associated with this technology.

Top 3 Remote Access Security Concerns  
In fall of 2013, HOB conducted a research survey on the state of remote access in the US. Over 200 CTOs and CIOs were polled, and findings revealed three main concerns regarding remote access security issues.

1.    Hackers gaining access to the Network during Employee Remote Access Solutions

Hackers have succeeded in breaking through two-factor authentication and identifying and exploiting vulnerability in a Web application to access an enterprise’s network. Therefore, it is not surprising that 66% of the polled respondents are concerned with hackers gaining access to the network during employee remote access sessions.
Organizations should implement safe and reliable VPNs which provide an adequate level of security, without compromising performance.

2.    Employees accessing the Network through their Personal Devices

Today, mobile devices such as smartphones, laptops and tablets have become an integral part of everyday life. As more organizations implement remote working policies, IT managers have less control over enterprise data from numerous devices. Furthermore, determining which devices are accessing which systems and data has become increasingly difficult.  
The repercussions of data breaches resulting from lost or stolen devices can be severe. In addition, IT managers generally lose data access visibility when multiple personal, unmanaged devices are connecting to the network simultaneously.
This highlights the importance of a comprehensive mobile workforce security policy, which should also include who is responsible for device maintenance and support, and which security measures should be implemented.

3.    Errors by the IT Team leaving the Network open to Intruders


Cyber-attacks are increasing in sophistication and frequency; the costs associated with cyber-attacks are not limited to monetary costs, but also encompass reputational loss and diminished competitive advantage. Security holes unintendedly created by the IT team may potentially lead to the exposure of sensitive enterprise data, financial fraud or even bankruptcy.
The results indicate that enterprises require new strategies in order to combat and prevent advanced cyber-attacks; IT teams should be wary of software and systems use and investigate any suspicious behaviors that are known to be associated with malicious activity.

Conclusion
As organizations make use of remote access to satisfy various business needs, securing the corporate network becomes priority. The findings of this study stress the importance of a robust mobile workforce strategy.

If you would like to learn about the state of remote access in the USA, please download our free eBook “The State of Remote Access in the US”.
 


Author: Hazel Farrugia

no comments |

How to Fight Cybercrime

Posted by Tobias Eichenseer Thu, 31 Jul 2014 11:52:00 GMT

Businesses and individuals are increasingly relying on computers and Internet-based networking. They experience several benefits, but also potential risks. When staff or business partners have constant access to internal networks from insecure locations, security is a major concern.

The Rise of Cybercrime
Cyberattacks generally refer to criminal activity involving the use of a computer network, normally conducted via the Internet. Internet users and organizations face increased risk of becoming targets of cyberattacks. An independent research report conducted by Ponemon Institute on organizations located in the United States in 2013 found that the U.S. experienced an increase of 18 percent in successful attacks from the previous year.
Today, criminals have more advanced technology and greater knowledge of cyber security. Attacks may include financial scams, computer hacking, virus attacks and distribution, denial-of-service, theft of an organization’s information assets, posting of sensitive business data on the Internet, and malware.

Risks of Cybercrime
For businesses and corporations, the cost associated with cyberattacks is large. Stolen or deleted corporate data can inflict financial damage on the victim, damage the company’s reputation, and negatively affect people’s livelihoods. The risks are even higher for small companies, since their businesses may rely solely on project files or customer data bases. The same Ponemon Institute study reported that in 2013, the average cost of cybercrime in the U.S. was $11.6 million annually - an increase in cost by 26 percent from the previous year.

Preventing Cyberattacks
Organizations should follow basic guidelines in order to reduce the security threat to their data and devices. To prevent cyberattacks, companies should:

1.    Use a Secure Connection to the Corporate Data
This generally involves implementing a Virtual Private Network (VPN). VPN technology provides protection for information that is being transmitted over the Internet by allowing users to form a virtual “tunnel” to securely enter an internal network to access resources, data and communications.

2.    Store Data Centrally
Centralized storage of data offers protection and increases speed, convenience and efficiency for accessing files. Sharing of files enables rapid and easy access to important data from virtually anywhere in the world. The relative mobility and control of data improves effectiveness of workflow. Another crucial advantage of centralized data is cost. Although it is possible to store and backup data on multiple machines, it is considerably more cost effective to use central storage. For instance, data can be stored on a server within the corporate LAN behind the firewall.

3.    Use Modern Authentication Methods
Authentication is the process by which the parties at either end of a network connection can verify the identity of the other party. Verification is typically based upon something you know (such as passwords), something you have (smart card or tokens), or something you are (biometric techniques, including fingerprint and eye scans). Deployment of modern authentication methods, such as Kerberos authentication protocol, ensures confidentiality through encryption that ensures no one can tamper with data in a Kerberos message. 

4.    Use Reliable, Strong Encryption Technology
Encryption is the process of changing information in a manner that cannot be deciphered by anyone except those holding special knowledge (generally referred to as a "key") that enables them to alter the information back to its original, readable form. A VPN turns the Internet (an unsecure environment) into a secure private network, by providing heavy encryption. In particular, an SSL VPN is best-suited for mobile apps. 
 
5.    Enforce Strong Passwords
Implementation of strong passwords is a basic security procedure, however it is often overlooked.  Complex, hard-to-crack passwords are a simple line of defense against a security breach. Password policies, which offer advice on proper password management, should be in place. Password best practices include:

•    Avoid using dictionary words or common sequences, such as numbers or letters in sequential order or repetitive numbers or letters.
•    Do not use personal information. 
•    Use special characters, such as * and #.  The majority of passwords are case sensitive, therefore, a mixture of both upper case and lower case letters, as well as numbers, should be used.
•    Choose a long password, as passwords become harder to crack with each added character.
•    Create different passwords for different accounts and applications. Therefore, if one password is breached, the security of other accounts is not at risk.
•    Never write down passwords and leave them unattended in a desk drawer or any other obvious place.
•    Never communicate a password by telephone, e-mail or instant messaging
•    Never disclose a password to others, including people who claim to be from customer service.
•    Change passwords whenever there is any doubt that a password may have been compromised.

Conclusion
The growing popularity and convenience of digital networks has led to an increase in cyberattacks; consequently, keeping up to date with the most recent and important concerns facing the organization is in itself a challenge. Organizations can protect their highly sensitive information by following a safety plan and adopting reasonable security practices.
 
If you would like to learn more about VPN technology, and review some tips on critical security aspects, download our free e-book: How Do I Find the Best VPN Solution for My Company?
 

no comments |

Why IT Controls are Vital for Your Business

Posted by Tobias Eichenseer Tue, 29 Jul 2014 12:32:00 GMT

Controls are a mode of living. Whether it’s the workplace that requires a key fob or an identification badge, a password to log into the company network, or an access permission to use a copier, there are numerous controls/safeguards that we encounter during the normal course of our everyday lives. 

Defining Control Activities
Control activities are actions taken to minimize risk. A risk is the probability of an event or action having adverse consequences on an organization, such as information assets that are not adequately safeguarded against loss.
Control activities occur throughout the organization and include diverse activities, including approvals, authorizations, verifications, reviews of operating performance, and security of assets.

Internal controls
Internal controls are a fundamental part of any organization’s financial and business policies and procedures. The advantages of internal controls are:

  • Prevention of errors and irregularities; if these do occur, the inaccuracies will be detected in a timely method
  • Protection of employees from being accused of misappropriations, errors or irregularities by clearly outlining responsibilities and tasks

IT Controls
IT controls are a subdivision of internal controls, and refer to policies, procedures and techniques on computer-based systems. IT controls are essential to protect assets, highly sensitive information and customers. IT controls support business management and governance; they also offer general and technical controls over IT infrastructures.

Subdivisions of IT Controls
Generally, IT controls are divided into two main categories:

1.    General Controls
These apply to all system components, processes and data for a specific organization. General control activities are conducted within the IT organization or the technology they support, which can be applied to each system that the organization depends upon. These controls facilitate confidentiality, integrity and availability, contribute to the safeguarding of data, and promote regulatory compliance. General controls make safe reliance on IT systems possible. Examples of such controls include access controls (physical security and logical access) and business continuity controls (disaster recovery and back-up).

2.    Application Controls
These controls are business process controls, and contribute to the efficiency of individual business processes or application systems. Examples of application controls include access authorization, which is essential for security of the corporate network. This prevents users from downloading illegal material or viruses, and may also block unproductive or inappropriate applications. Other examples of application controls include segregation of duties and concurrent update control.

Modern IT Solutions
Virtual private network (VPN) technology enables a secure connection to the organization’s data to be made over insecure connections, such as the Internet, and is essential to providing comprehensive security, safety and flexibility to businesses. Furthermore, advanced VPN technology offers several services which help users maintain access to critical information. VPNs facilitate the implementation of IT controls. For instance, VPNs provide dynamic access portals, whereby network managers can define server access with application publishing in such a way that the user only sees his or her personal, customized portal.

Conclusion

Control activities occur throughout the organization, and IT controls are fundamental to protect information assets and mitigate business risks. Deployment of a modern virtual private network (VPN) technology facilitates the implementation and management of IT controls.

If you would like to learn more about VPN technology, and review some helpful tips on critical security aspects, download our free e-book: How Do I Find the Best VPN Solution for My Company?

no comments |