Upload
fuji-xerox-asia-pacific
View
156
Download
0
Embed Size (px)
Citation preview
The Insider Threats Are You at Risk?
Protect ing the Value of Your Business 2
Suffice it to say that this information can encompass almost anything, including manufacturing and business processes, business plans, presentations, financial data, market intelligence, customer, supplier and pricing information, new innovative ideas, methods and technologies, to mention some of the most common forms.
Today’s online world brings new challenges to businesses, making the security of your businesses’ internal information extremely critical.
market intelligence
Pric
ing
information
technologies
Data
DataData
Data
Data
3Protect ing the Value of Your Business
According to the State of Risk Report, surveyed in late 2014, 476 of ITprofessionals questioned had noor only a partial system in place
for securing internal data.
4Protect ing the Value of Your Business
That included customer names, addresses, phone numbers and email contact information. This has been recorded as the biggest cyber-attack in corporate history.
That same year, financial heavy-hitter, J.P. Morgan revealed that a cyber-attack over the summer may have compromised information of about 76 million households.
Protect ing the Value of Your Business 5
As we are all connected to the Internet, we all can become a victim of cyber-attacks. So, what can you do to better protect your
business and secure your internal data?
6Protect ing the Value of Your Business
Document and Data Storage
Organisations have documents processed on a daily basis - regardless if they operate on a paperless system or not. Though some may process transactions without ever printing copies - 15% of an organisation’s revenue is spent creating, managing and distributing documentation.
1
15%of revenue is spent creating, managing and distributing documentation*
* Fuji Xerox 2016 Whitepaper, "Give Your Customer A Voice"
7Protect ing the Value of Your Business
1
60% of employee time is spent working with documents, receipts, purchase orders, and legal documents which also require paper back ups for filing purposes. As required by law, these documents are kept in a secured
storage areas for a number of years.
8Protect ing the Value of Your Business
Enable user restrictions on who can access, share, or print documents existing in shared
folders. Document rights management and secured
folders mean key repositories can be shared safely.
Centralised user and device management information
are backed up regularly, facilitating prompt restoration
of settings when required.
Redundancy systems should be in place so that in the event of a calamity, service will not
be interrupted.
Where your data is stored is as equally important as who has back-end access to it. Consider the following: Where is your data physically stored? Who monitors and controls the hardware and software? Is your service provider dedicated to improving its management processes and safeguarding against security attacks?
Practical Tips
In the event of a calamity, will service be interrupted? What is your data recovery plan? Check how highly your provider’s data centre facility is rated.
For those in fast-paced workplaces, information security isn’t an issue until it suddenly is. The truth is, any employee has the opportunity to release confidential data - sharing it with competitors, vendors or the media.
Protect ing the Value of Your Business 9
Cloud Computing
The more accessible information becomes, the more important it is to protect it. Where your data is stored – including who has back-end access to it – is just as important as what happens when data travels. Placing your organisation on thecloud makes it agile and responsive,which are crucial qualities in a dynamic world.
2
Protect ing the Value of Your Business 10
A 2015 study revealed cyber attacks on cloud deployments have increased by 45%, with more than 800,000 security incidents estimated over the course of just one year.*
Introduce mobile security measures that enables
employees to print securely from any device without installing a print driver.
Get a better view on who can access what,
from where, and how by employing user
authentication protocol.
Integrate a cloud solution so employess can access
documents on the go and print them
using wireless printing.
Practical Tips
*www.technewsworld.com
11Protect ing the Value of Your Business
Mobile Devices
Smartphones and tablets have become as essential to businesses, allowing employees to access company data remotely. Increased opportunity often comes with increased risk, and these same mobile devices are quickly becoming the leading cause of breaches in organisations, costing millions of dollars in possible loss.
A new study by the Ponemon Institute speaks to employee’s mobile devices as being one of the root causes of many of today’s data breaches.
3
12Protect ing the Value of your Business
“Of the 1028 IT and IT security professionals surveyed who are employed in 2000 companies
world-wide, 67% say they it is certain their organisation had a data breach as a result of
employees using their mobile devices to access their company’s sensitive and confidential information
from remote locations.”
3
13Protect ing the Value of your Business
Employees are dragging companies into the tech era – it’s not out of ordinary to work remotely and depend on your mobile device as the only means to connect. Organisations aren’t aligned with this notion and therefore aren’t doing enough to keep up with risks in and out of the workplace.
While they are valuable when it comes to conducting business, mobile devices also pose security risks. It only takes one infected device to cause a great deal of internal corporate damage and as technology advances so does the intrusive software that’s running undetected.
Don’t underestimate how much employees rely on mobile
devices. Focus on introducing mobile security measures that
safely enable employees to print securely from any device without
installing a print driver.
Implement safeguards to keep corporate data secure such
as user authentication protocol on mobile devices.
Review your mobile security policy and get a better
handle on who can access what, from where, and how. Ensure the same print security settings are employed consistently across all
devices - from desktop PC, to tablet and smartphone.
Practical Tips
Protect ing the Value of Your Business 14
Document Printing and Copying
An oversight on many security policies is the use of printers, scanners, and copiers. Over the years multifunctional printers have developed additional features like scan-to-email and cloud integration to enable users to scan and print from cloud applications.
With the emergence of NFC-enabled applications, it’s said that more than a billion1 phones will have the capability to use the wireless protocol to exchange data, and applications beyond payments will become common - potentially opening up new verticals for attack.
1 iDate, http://seekingalpha.com/article/2477835-intel-is-a-mobile-payments-player-too
4
Protect ing the Value of Your Business 15
Because the printers of today have their own embedded servers, and many offer remote access via cloud application, it’s important that they are properly secured.
Give employee usernames and track dates and times for each print job. You can also set usage restrictions for individual employees or user
groups. Not only does it enhance traceability of jobs, it also presents
meaningful information on a user-specified interface.
Encryption enables you to apply protection directly to the data.
Even if the perimeter is breached, you can be sure that your
information remains secure by removing overwrites and ensuring read-only
documentation when sharing.
By utilising a quota on print output quantity, each user or
user group can be specified and limited. Usage limits and status can also be monitored regularly.
Practical Tips
16
Protect ing the Value of Your Business
The scope for data leakage is very wide, and not limited to just
web and mobile devices.
The cyber security industry is growing as
you’re reading this but being aware of the
threats, vulnerability trends and the policies and solutions available
is the first step in prevention.
No matter how large or small your company is,
you need to have a plan to ensure the security of your information assets.
Protecting your data means protecting its
confidentiality, integrity, and availability.
Having a robust security policy means that
you’ve taken steps to diminish the risk of
losing data in any one of a variety of ways
previously mentioned. The value of your
business is in its data – protect it at all costs.
Protect ing the Value of Your Business 17
Is your current risk and information management strategy up to date
and does it allow you to effectively navigate the complexities of reputation
management? Learn more about document management with
Fuji Xerox Smart Work Gateway. With the right document workflow in
place, your organization can move one step closer to securing business success.
18Protect ing the Value of Your Business
Smart Work Gateway
Smart Work Gateway (SWG) is a new way of working. It changes how you manage your workplace and helps you re-imagine your operations and streamline your communications, setting a new benchmark in usability.
With SWG, you can boost flexibility, remove barriers, and give yourself the freedom to organize how you wish to work. Change how you plug in, sign on and connect to your workplace from any location you choose. Free up your time, be productive and spend your time on work that is meaningful to you. Importantly, in today’s world, SWG allows you to achieve this while adhering with compliance and security policies. Simply put, it is an employee and customer-centric approach to change the environment you work in.