Intelligent CIO Africa Issue 20 - Page 45

This increases the potential for an attack. We have previously seen personal devices undergo numerous malware attacks, for instance in 2017 McAfee researchers identified 144 apps on the Google Play store that contained a new malware strain, Grabos. If this malware was downloaded on the company network, it could lead to a data breach disaster. How to avoid this but still give employees freedom? One option to avoid these breaches is to block personal devices and using social media in the work place. However, the fact is, employees want to use their new gadgets and access apps in the office and companies want to entice new staff by allowing them. Rather than restrict employees, it is important to educate them on what is likely a phishing scam or a malware riddled piece of software and help them become the first line of defence. Businesses can also ensure they are avoiding major data “ WITH THE RIGHT SOLUTIONS COMPANIES CAN GET AHEAD OF THEIR STAFF AND PROTECT NETWORKS NO MATTER WHAT NEW GADGETS ARE SUDDENLY CONNECTED TO THEM. breaches by having full visibility over what devices are connected to their network. Using systems that identify all devices on the network at any given time, like an IP address management system, can provide real-time visibility of anything connected to the company network. They can also secure their network through DNS security solutions that will alert them of any new assets or devices that are joining the system so they can identify and block malicious activity quickly. Get ahead of the cybercriminals Personal devices and consumer apps aren’t going to go away from the workplace. In fact, each year a new device will be on trend and people will immediately want it on their desk. These will provide a whole new host of ways that make it much easier for cybercriminals to access company data. We are essentially making it easier for them each time we buy a new toy. But, the war is not lost. With the right solutions, companies can get ahead of their staff and protect networks no matter what new gadgets are suddenly connected to them. n INTELLIGENTCIO 45