INTELLIGENT BRANDS // Enterprise Security
effective security education and advanced
cloud security solutions that goes hand-in-hand
with those responsibilities. As a community we
must work together to enact better business
processes. This is in part why we launched
the Cyber Resilience Coalition, bringing
together leading security, data protection and
business continuity vendors to help strengthen
organisations’ total cyber resilience strategy.
“Another issue we can work together to control
is rogue employees who use file-sharing or cloud
storage services to steal valuable corporate
data – also known as malicious insiders. IT
managers have, for too long, not paid due
attention to this threat. We must re-evaluate
unrestricted access to these services and ensure
that other protections are put in place quickly.”
Mimecast tips for safeguarding
against malicious insiders
Assign role-based permissions to administrators
to better control access to key systems and limit
the ability of a malicious insider to act.
Implement internal safeguards and data
exfiltration control to detect and mitigate the
risk of malicious insiders when they do strike,
to cut off their ability to send confidential data
outside the network.
Offer creative employee security training
programs that deter potential malicious insiders
in the first place and help others to spot the
signs so they can report inappropriate activity
to their managers. Then, back that up with
effective processes to police and act swiftly in
the event of an attack.
Nurture a culture of communication within
teams to help employees watch out for each
other and step in when someone seems like
they’ve become disenchanted or are at risk of
turning against the company.
Train your organisation’s leadership to
communicate with employees to ensure open
communication and awareness.
*This data was extracted from a Mimecast
survey of 600 IT security managers from
organisations in the United States, United
Kingdom, South Africa and Australia. The
initial findings of that survey were released in
February 2016.
58
INTELLIGENTCIO
At a glance…
Kaspersky launches new SaaS
security solution for SMBs
Kaspersky Lab has
announced a new Software-
as-a-Service solution that will
provide small and medium-
sized businesses with
multi-layered IT security –
Kaspersky Endpoint Security
Cloud. The solution offers
advanced functionality and
proven protection that can
be managed easily via simple cloud-based console with an
intuitive and user-friendly interface.
Small and medium-sized businesses (SMBs) are using 100-1000
devices, including not just personal computers and laptops, but
also smartphones and tablets. With these devices, they experience
a number of IT security threats. Among top 5 causes of the
most serious data breaches are viruses and Trojans, exploits and
loss through mobile malware, crypto-ransomware, phishing and
carelessness of employees. According to Corporate IT Security
Risks Survey conducted by Kaspersky Lab in 2016, 48% of
respondents admit that complexity of IT infrastructure increased
and 62% of all SMBs had suffered 2-5 separate incidents of data
loss in one year.
Despite the wide range of security products on the market
today, SMBs may struggle to find a comprehensive solution they
can implement and afford. Kaspersky Endpoint Security Cloud
has been developed to meet the evolving needs of SMBs and
their under-resourced IT teams, as well as the Managed Service
Providers (MSP) who support them.
The solution provides businesses with effective protection for
Windows workstations, file servers, Android and iOS mobile devices,
all through a simple and intuitive console. Based on advanced,
multi-layered security technologies, Kaspersky Endpoint Security
Cloud leverages industry leading protection features, including
Kaspersky Security Network and System Watcher, to protect users
from both known and emerging threats.
The centralised cloud management console does not require
advanced IT skills, significantly reducing the burden on over-
stretched IT professionals. It can be used at any time and from
any location to remotely distribute software, and to monitor and
manage the security of up to one thousand corporate users.
www.intelligentcio.com