Page 15 - index
P. 15
2. Deploy a VPN
A virtual private network (VPN) is an absolute necessity. VPNs allow users to securely access a
private network and share information, use applications, and access network servers remotely
though public networks.
If employees are required to use a VPN to access corporate resources, there’s built-in security
for content moving from company servers to the employee’s device.
A properly set up VPN gives network administrators more control, is cost-effective and safe. It
works well for remote workers and offices, and can really help when it comes to contract
employees or consultants because network access can be defined and restricted.
3. Keep up with updates
Hackers are constantly finding ways to exploit vulnerabilities in networks, software, web
applications and websites. As agile as hackers are, so are the security experts and software
vendors that put out these products. They keep up to date on the latest vulnerabilities and issue
patches on a regular basis. The same goes for anti-virus and anti-malware software, which are
frequently updated to protect computers from the latest threats.
Because these fixes often require a restart, or otherwise slow the pace of work, computers can
remain vulnerable. IT teams should consider deploying a program that forces regular updates
by restricting access to the network unless vital security measures are up to date.
4. Provide secure alternatives for collaboration and cloud storage
Cloud-based computing has changed the way teams are able to collaborate and interact. It’s
also changed the way employees access and share information. But the easiest and most
common ways - consumer cloud storage options, such as Google Drive and Dropbox, or a USB
drive – aren’t necessarily the most secure options.
For example, an employee working on a sensitive financial report saves it to his personal
Google Drive so he can work on the report at home on his desktop PC. A few weeks later, this
employee decides to leave the company for a competitor and has sensitive corporate assets on
his personal computer.
There’s no way for supervisors to know files are on the employee’s personal drive, let alone
retrieve them. Network admins can restrict access to these services on company provided
devices, or strongly discourage their use in a clearly stated policy.
The purchase of business-grade tools for secure file sync and share, as well as enterprise
collaboration, is as much an investment in security as it is in employee productivity. With
powerful alternatives to consumer cloud services at their disposal, employees will likely choose
to go the more secure route.
15 Cyber Warnings E-Magazine – August 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide