Story image

Dimension Data's four simple tips for smart cybersecurity

12 Oct 2016

Dimension Data New Zealand's CEO Jo Healey provided some simple tips for New Zealand businesses and the need to remain cybersecure, after speaking at this week's launch of the annual Connect Smart Week.

Connect Smart Week was launched to raise awareness and encourage people and organisations to consider not only traditional cyberthreats, but also what Healey calls "the weakest links in the chain" - or the everyday users.

Those users have now become the 'new perimeter' of organisational defence, especially those who use their own devices or others that are not managed by their organisation. Attackers are increasingly going after users, and it's those users who can give attackers what they want.

“While it is easy for an organisation to secure its systems in the workplace, today’s workers are not static. The growing prevalence of mobile workers globally, and in New Zealand, means the perimeter of an organisation’s network could, literally, be anywhere," she says.

Healey says that the fine balance between mobile workforces with security is what shaped the four tips that will help protect users and organisations - after all, the worst thing you can do is ignore the risks.

1. Understand end user needs
Dimension Data says that if organisations take the view that the end user is the new perimeter, then they are the 'logical' starting point. Discovering what those users require and what applications they use can form the basis of end-user computing strategies.

2. Understand critical risk points

This can be done by analysing all devices in an organisation and ranking them according to perceived risk level.

3. Form transparent and firm security policies

These policies should balance risk points and end user needs. It should be clear and understandable. For example, you can govern the access to applications by device, software, or even geographical region — restricting access when exposed to high-risk networks.

4. Communicate and educate end users

Dimension Data says that end users will only adopt new policies if they understand what the policies are and why they exist. This will require ongoing communication and refinement so users are always vigilant and up to date.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.