18
The Insider Threats Are You at Risk?

The Insider Threats - Are You at Risk?

Embed Size (px)

Citation preview

Page 1: The Insider Threats - Are You at Risk?

The Insider Threats Are You at Risk?

Page 2: The Insider Threats - Are You at Risk?

Protect ing the Value of Your Business 2

Suffice it to say that this information can encompass almost anything, including manufacturing and business processes, business plans, presentations, financial data, market intelligence, customer, supplier and pricing information, new innovative ideas, methods and technologies, to mention some of the most common forms.

Today’s online world brings new challenges to businesses, making the security of your businesses’ internal information extremely critical.

market intelligence

Pric

ing

information

technologies

Data

DataData

Data

Data

Page 3: The Insider Threats - Are You at Risk?

3Protect ing the Value of Your Business

According to the State of Risk Report, surveyed in late 2014, 476 of ITprofessionals questioned had noor only a partial system in place

for securing internal data.

Page 4: The Insider Threats - Are You at Risk?

4Protect ing the Value of Your Business

That included customer names, addresses, phone numbers and email contact information. This has been recorded as the biggest cyber-attack in corporate history.

That same year, financial heavy-hitter, J.P. Morgan revealed that a cyber-attack over the summer may have compromised information of about 76 million households.

Page 5: The Insider Threats - Are You at Risk?

Protect ing the Value of Your Business 5

As we are all connected to the Internet, we all can become a victim of cyber-attacks. So, what can you do to better protect your

business and secure your internal data?

Page 6: The Insider Threats - Are You at Risk?

6Protect ing the Value of Your Business

Document and Data Storage

Organisations have documents processed on a daily basis - regardless if they operate on a paperless system or not. Though some may process transactions without ever printing copies - 15% of an organisation’s revenue is spent creating, managing and distributing documentation.

1

15%of revenue is spent creating, managing and distributing documentation*

* Fuji Xerox 2016 Whitepaper, "Give Your Customer A Voice"

Page 7: The Insider Threats - Are You at Risk?

7Protect ing the Value of Your Business

1

60% of employee time is spent working with documents, receipts, purchase orders, and legal documents which also require paper back ups for filing purposes. As required by law, these documents are kept in a secured

storage areas for a number of years.

Page 8: The Insider Threats - Are You at Risk?

8Protect ing the Value of Your Business

Enable user restrictions on who can access, share, or print documents existing in shared

folders. Document rights management and secured

folders mean key repositories can be shared safely.

Centralised user and device management information

are backed up regularly, facilitating prompt restoration

of settings when required.

Redundancy systems should be in place so that in the event of a calamity, service will not

be interrupted.

Where your data is stored is as equally important as who has back-end access to it. Consider the following: Where is your data physically stored? Who monitors and controls the hardware and software? Is your service provider dedicated to improving its management processes and safeguarding against security attacks?

Practical Tips

In the event of a calamity, will service be interrupted? What is your data recovery plan? Check how highly your provider’s data centre facility is rated.

For those in fast-paced workplaces, information security isn’t an issue until it suddenly is. The truth is, any employee has the opportunity to release confidential data - sharing it with competitors, vendors or the media.

Page 9: The Insider Threats - Are You at Risk?

Protect ing the Value of Your Business 9

Cloud Computing

The more accessible information becomes, the more important it is to protect it. Where your data is stored – including who has back-end access to it – is just as important as what happens when data travels. Placing your organisation on thecloud makes it agile and responsive,which are crucial qualities in a dynamic world.

2

Page 10: The Insider Threats - Are You at Risk?

Protect ing the Value of Your Business 10

A 2015 study revealed cyber attacks on cloud deployments have increased by 45%, with more than 800,000 security incidents estimated over the course of just one year.*

Introduce mobile security measures that enables

employees to print securely from any device without installing a print driver.

Get a better view on who can access what,

from where, and how by employing user

authentication protocol.

Integrate a cloud solution so employess can access

documents on the go and print them

using wireless printing.

Practical Tips

*www.technewsworld.com

Page 11: The Insider Threats - Are You at Risk?

11Protect ing the Value of Your Business

Mobile Devices

Smartphones and tablets have become as essential to businesses, allowing employees to access company data remotely. Increased opportunity often comes with increased risk, and these same mobile devices are quickly becoming the leading cause of breaches in organisations, costing millions of dollars in possible loss.

A new study by the Ponemon Institute speaks to employee’s mobile devices as being one of the root causes of many of today’s data breaches.

3

Page 12: The Insider Threats - Are You at Risk?

12Protect ing the Value of your Business

“Of the 1028 IT and IT security professionals surveyed who are employed in 2000 companies

world-wide, 67% say they it is certain their organisation had a data breach as a result of

employees using their mobile devices to access their company’s sensitive and confidential information

from remote locations.”

3

Page 13: The Insider Threats - Are You at Risk?

13Protect ing the Value of your Business

Employees are dragging companies into the tech era – it’s not out of ordinary to work remotely and depend on your mobile device as the only means to connect. Organisations aren’t aligned with this notion and therefore aren’t doing enough to keep up with risks in and out of the workplace.

While they are valuable when it comes to conducting business, mobile devices also pose security risks. It only takes one infected device to cause a great deal of internal corporate damage and as technology advances so does the intrusive software that’s running undetected.

Don’t underestimate how much employees rely on mobile

devices. Focus on introducing mobile security measures that

safely enable employees to print securely from any device without

installing a print driver.

Implement safeguards to keep corporate data secure such

as user authentication protocol on mobile devices.

Review your mobile security policy and get a better

handle on who can access what, from where, and how. Ensure the same print security settings are employed consistently across all

devices - from desktop PC, to tablet and smartphone.

Practical Tips

Page 14: The Insider Threats - Are You at Risk?

Protect ing the Value of Your Business 14

Document Printing and Copying

An oversight on many security policies is the use of printers, scanners, and copiers. Over the years multifunctional printers have developed additional features like scan-to-email and cloud integration to enable users to scan and print from cloud applications.

With the emergence of NFC-enabled applications, it’s said that more than a billion1 phones will have the capability to use the wireless protocol to exchange data, and applications beyond payments will become common - potentially opening up new verticals for attack.

1 iDate, http://seekingalpha.com/article/2477835-intel-is-a-mobile-payments-player-too

4

Page 15: The Insider Threats - Are You at Risk?

Protect ing the Value of Your Business 15

Because the printers of today have their own embedded servers, and many offer remote access via cloud application, it’s important that they are properly secured.

Give employee usernames and track dates and times for each print job. You can also set usage restrictions for individual employees or user

groups. Not only does it enhance traceability of jobs, it also presents

meaningful information on a user-specified interface.

Encryption enables you to apply protection directly to the data.

Even if the perimeter is breached, you can be sure that your

information remains secure by removing overwrites and ensuring read-only

documentation when sharing.

By utilising a quota on print output quantity, each user or

user group can be specified and limited. Usage limits and status can also be monitored regularly.

Practical Tips

Page 16: The Insider Threats - Are You at Risk?

16

Protect ing the Value of Your Business

The scope for data leakage is very wide, and not limited to just

web and mobile devices.

The cyber security industry is growing as

you’re reading this but being aware of the

threats, vulnerability trends and the policies and solutions available

is the first step in prevention.

No matter how large or small your company is,

you need to have a plan to ensure the security of your information assets.

Protecting your data means protecting its

confidentiality, integrity, and availability.

Having a robust security policy means that

you’ve taken steps to diminish the risk of

losing data in any one of a variety of ways

previously mentioned. The value of your

business is in its data – protect it at all costs.

Page 17: The Insider Threats - Are You at Risk?

Protect ing the Value of Your Business 17

Is your current risk and information management strategy up to date

and does it allow you to effectively navigate the complexities of reputation

management? Learn more about document management with

Fuji Xerox Smart Work Gateway. With the right document workflow in

place, your organization can move one step closer to securing business success.

Page 18: The Insider Threats - Are You at Risk?

18Protect ing the Value of Your Business

Smart Work Gateway

Smart Work Gateway (SWG) is a new way of working. It changes how you manage your workplace and helps you re-imagine your operations and streamline your communications, setting a new benchmark in usability.

With SWG, you can boost flexibility, remove barriers, and give yourself the freedom to organize how you wish to work. Change how you plug in, sign on and connect to your workplace from any location you choose. Free up your time, be productive and spend your time on work that is meaningful to you. Importantly, in today’s world, SWG allows you to achieve this while adhering with compliance and security policies. Simply put, it is an employee and customer-centric approach to change the environment you work in.