Intelligent CIO Middle East Issue 10 | Page 58

INTELLIGENT BRANDS // Enterprise Security effective security education and advanced cloud security solutions that goes hand-in-hand with those responsibilities. As a community we must work together to enact better business processes. This is in part why we launched the Cyber Resilience Coalition, bringing together leading security, data protection and business continuity vendors to help strengthen organisations’ total cyber resilience strategy. “Another issue we can work together to control is rogue employees who use file-sharing or cloud storage services to steal valuable corporate data – also known as malicious insiders. IT managers have, for too long, not paid due attention to this threat. We must re-evaluate unrestricted access to these services and ensure that other protections are put in place quickly.” Mimecast tips for safeguarding against malicious insiders Assign role-based permissions to administrators to better control access to key systems and limit the ability of a malicious insider to act. Implement internal safeguards and data exfiltration control to detect and mitigate the risk of malicious insiders when they do strike, to cut off their ability to send confidential data outside the network. Offer creative employee security training programs that deter potential malicious insiders in the first place and help others to spot the signs so they can report inappropriate activity to their managers. Then, back that up with effective processes to police and act swiftly in the event of an attack. Nurture a culture of communication within teams to help employees watch out for each other and step in when someone seems like they’ve become disenchanted or are at risk of turning against the company. Train your organisation’s leadership to communicate with employees to ensure open communication and awareness. *This data was extracted from a Mimecast survey of 600 IT security managers from organisations in the United States, United Kingdom, South Africa and Australia. The initial findings of that survey were released in February 2016. 58 INTELLIGENTCIO At a glance… Kaspersky launches new SaaS security solution for SMBs Kaspersky Lab has announced a new Software- as-a-Service solution that will provide small and medium- sized businesses with multi-layered IT security – Kaspersky Endpoint Security Cloud. The solution offers advanced functionality and proven protection that can be managed easily via simple cloud-based console with an intuitive and user-friendly interface. Small and medium-sized businesses (SMBs) are using 100-1000 devices, including not just personal computers and laptops, but also smartphones and tablets. With these devices, they experience a number of IT security threats. Among top 5 causes of the most serious data breaches are viruses and Trojans, exploits and loss through mobile malware, crypto-ransomware, phishing and carelessness of employees. According to Corporate IT Security Risks Survey conducted by Kaspersky Lab in 2016, 48% of respondents admit that complexity of IT infrastructure increased and 62% of all SMBs had suffered 2-5 separate incidents of data loss in one year. Despite the wide range of security products on the market today, SMBs may struggle to find a comprehensive solution they can implement and afford. Kaspersky Endpoint Security Cloud has been developed to meet the evolving needs of SMBs and their under-resourced IT teams, as well as the Managed Service Providers (MSP) who support them. The solution provides businesses with effective protection for Windows workstations, file servers, Android and iOS mobile devices, all through a simple and intuitive console. Based on advanced, multi-layered security technologies, Kaspersky Endpoint Security Cloud leverages industry leading protection features, including Kaspersky Security Network and System Watcher, to protect users from both known and emerging threats. The centralised cloud management console does not require advanced IT skills, significantly reducing the burden on over- stretched IT professionals. It can be used at any time and from any location to remotely distribute software, and to monitor and manage the security of up to one thousand corporate users. www.intelligentcio.com