data security

Data Security on Mobile: Enhance Your Personal Information Online

Data Security on Mobile: Enhance Your Personal Information Online 150 150 Simon Randall

As smartphone ownership increases in number (163.9 million for 2014 and projected to reach 182.6 million by next year), there is also a boost in personal mobile data information being shared online and saved on devices. Security became the main concern in the consumer tech world. As an answer, manufacturers have resorted to various ways on how to prevent data leakage in the past year.

Recently, we witnessed the launch of smartphones with a fingerprint scanner. It was Motorola that came up with the world’s first fingerprint scanning smart handset on the market through their Motorola Atrix. However, Apple was the one who introduced it widely in the public last year with their iPhone 5S and TouchID that allows users to purchase apps using only their print. Today, Samsung also joined the bandwagon by releasing not only a handset with a scanner (Galaxy S5) but also tablets that can be unlocked using the owner/s’ fingerprint. 

Different information shared on mobile
With its ability to connect to the internet, most of our transactions are now via our smartphones, tablets, and smartwatches. Here is a list of the common information you share online through handsets:
• Bank details
• Social media information
• Personal facts 
• Email
• Pictures
• Confidential information about your office
mTech for Enterprise
With the increasing power of mobile technology (mTech) through the announcement of 64-bit architecture for handset, more businesses and industries are considering these devices as new platforms in encouraging work on the go. Tablets are more often used by professionals since it offers larger screen than the smartphone. Similar to handsets, today’s tabs are now equipped with fingerprint scanner that adds protection to its owner and their mobile data. Samsung introduced their Galaxy Tab S variants with fingerprint sensor to unlock the device. Likewise, Apple recently launched their new iPads (the Air 2 and Mini 3) with the TouchID that not only unlocks the device but can also be used as a replacement to the Apple ID when purchasing apps at the App Store. Currently, the two manufacturer’s tablets
with fingerprint scanner are offered with mobile internet and price plan at the O2 tab site.

Here’s how you can improve your mobile data security:
1.Be informed: The more you know about data security and its leakage, the less chance you’ll commit errors. For enterprises, it’s highly important to 
have a conference with your employees discussing the importance of keeping their mobile safe, especially when they’re using it to access company emails and servers. 
2. Delete your digital marks: As much as possible do not leave traces of your information on your devices. Delete your history, cookies, and saved passwords in your devices. This avoids leaking your information in case your gadget gets stolen. It will also pay off to make your passwords highly secure by making it unique, long, and updated frequently. 
3. Avoid public Wi-Fi: Connecting to open public wireless internet networks is dangerous since your mobile information is also open for hacking by everyone on the system. It’s best to use encrypted networks and access online information through VPN. 
4. Backup: Save as much information through a backup drive. Maximized a highly secure cloud server technology where you can keep a record of the rest of your files. This will also be beneficial to companies who are sharing confidential records online.

Overall, the complete safeguarding of your personal information depends on your ability to be keen in sharing data online. Remember that digital footprints are difficult to delete, and will forever be saved in the big World Wide Web. How do you keep your data safe on your smart devices?

Exclusively submitted by JenBirch to Quadratek

Is Your Business Security Good Enough

Is Your Business Security Good Enough 150 150 Kerry Butters

Computer security is an important issue for any business and it seems that hardly a day goes by without us hearing about another botnet, hack or malware attack doing the rounds. The most notable of late was a vulnerability in SSL certificates, and whilst there’s little evidence to suggest that hackers have taken advantage of the Heartbleed bug, it still brings to the fore the ever-increasing problem that is network security.

For businesses, securing the company network isn’t a particularly difficult task, nor is staff training, but many still don’t have adequate enough protection to ensure that the company, or even customer, data is safe.

According to a recent survey carried out by the Poneman Institute, this is due to many enterprises lacking the tools to protect their information and “a disconnect in executives’ perceived value of data”. The study saw a huge 80% of IT professionals state that their company execs don’t seem to see the correlation between a cyber-attack and loss of revenue when it comes to stolen data.

Security is lacking all round

This is a worrying statistic, as security has to be a priority in this technological age that we live in. If customer data is stolen, firms stand to lose not only a loss in business due to the spectre of a system audit, but also possible fines and even the loss of customer confidence. Even if it’s not customer data that’s stolen, the loss of sensitive data from within a company can have serious ramifications for the future.

The study also found that a large majority of IT professionals don’t feel that they are given adequate tools or budget to be able to effectively protect the network from an attack. Further to this, just 41% said that they believe they understand the threat landscape facing businesses today and a third of those asked said that following a data breach, they didn’t know exactly what data had been stolen, or how.

However, the research also found that board level executives are learning, as there was an increased understanding when compared to previous survey results. There does also seem to be a lack of communication between companies and vendors taking place too, as 51% said that their solutions provider doesn’t let them know about the root cause of an attack after it had occurred.

6 in 10 firms don’t have adequate security

The study also found that six in ten companies don’t have adequate protection, which seems slightly unbelievable when you consider the how newsworthy cyber-attacks have become.

“This global security report shows that the cyber-security industry still has more work to do when it comes to addressing cyber-attacks,” John McCormack, Websense CEO, said in a statement. “Security professionals need effective security measures and heightened security intelligence to keep organizations safe from advanced attacks and data loss.”

But does all of the responsibility lie with security professionals, especially in light of the above statistic? Not really, when it comes to it, the security of any company’s data and that of its customers if the responsibility of the business. This means that it’s necessary to invest in enterprise-level solutions which should take a layered approach to security that includes, hardware, software and staff training.

Training is a security must

Employees often lack enough training to understand how even the simplest actions could cause a security breach at work. Many examples of malware are capable of effectively taking over a machine to examine the company network and steal data, just because an employee has carried out an action as simple as clicking on a link.

Whilst this can be addressed to some extent with permissions on the company network which don’t give all employees full administrative rights, this isn’t completely the answer. Employees need to know the consequences of their actions and without training, they simply can’t.

Such basic training can easily be implemented at induction time, when a new employee first joins the company, and can be further reinforced with a strong company policy document. This could include:

·         Information on data protection and what happens to the company if this is breached

·         Social media at work usage policies (ban clicking on meme links and suchlike)

·         How to deal with links and attachments in email

·         What to do if they think they may have clicked on a malicious link

·         General overview of computer security

·         Strong BYOD policies for those using their own devices

·         The use of open Wi-Fi connections to connect to the company network

Security is the responsibility of us all

Many consumers lack the basic knowledge when it comes to dealing with malware, viruses and other attacks, especially when it comes to social media. However, if there’s something many high profile attacks such as Conficker should have taught us, it’s that internet and network security is something that we all should have a vested interest in.

Conficker was a worm that appeared in 2008 which created a huge botnet that potentially had the ability to threaten the entire internet infrastructure. Now imagine if the internet was taken down by a botnet and the implications that has for national infrastructures. We rely so much on technology now that Conficker really did have the power to create complete chaos.

But how much have we really learned from Conficker? If it’s true that only 4 in ten firms have adequate network security, then it would seem not very much. Governments have begun to address the issue on national levels by creating cyber task forces, and are working more closely with businesses to heighten awareness surrounding internet and data security, but is it enough?

Not really. Firms have to be willing to take action and that means that board level executives have to learn the importance and value of the data that they store. Added to this, awareness must be raised at all levels within a business if it is to successfully ensure that the network is protected.

For execs, this means listening to the concerns of IT staff, as well as educating themselves on potential threats and data loss. Ideally, a disaster recovery plan should also be put in place so that a company can quickly respond should the worst happen.

We all have a responsibility to ensure that the internet and our data is protected, and the only way that can happen is through education and the implementation of robust, enterprise grade security solutions on the business network.

Is your company data secure? Whatever the size of your business, we can help to advise you on the best solution for you. Give us a call today on +44 (0)8450 740 530 to see how we can help you to secure your company and customer data and protect from attack.






captcha