Cyber Security Institute

§ Current Worries

Top 3 Worries

  • Regulations
  • Old Firewall Configurations
  • Security Awareness

§ Listening

For the best information

  • The underground
  • Audible
  • Executive Excellence
  • Music (to keep me sane)

§ Watching

For early warnings

  • 150 Security Websites
  • AP Newsfeeds
  • Vendors

Thursday, April 11, 2013

Detection, response key to effective security

While security is generally top of the IT department’s agenda, and it is the IT department’s role to secure a business’ systems and data, many security weaknesses are unwittingly caused by these same people who are responsible for securing a network. This was the result of research conducted by security software company Kaspersky Lab, says Danny Myburgh, MD of Cyanre, and is the result of the IT department’s focus on keeping IT working, and because they are caught between the business needs of securing devices and data and the increasing demands for mobility.

With corporate security measures becoming increasingly more effective, often the only point of entry to a company’s network for a cyber criminal is via an employee.


“Research found that the negative impact of mobile devices on security was not only the result of the mobility of devices, but because of a number of assumptions IT departments make around the data they carry. In today’s mobile business environment, securing mobile devices has become a priority, but many IT departments neglect to think about the fact that the data carried on these devices isn’t contained as it would be in a centralised office environment. By working with the assumption that this is the same situation as when the data is in the data centre, IT becomes an unwitting accomplice of cyber criminals, according to Kaspersky’s research,” Myburgh points out.


“IDC data also shows that mobility is the number one factor driving new security spending, suggesting that more organisations are taking heed and beefing up security measures beyond their data centre perimeters.”



Link: http://www.itweb.co.za/index.php?option=com_content&view=article&id=63127

Posted on 04/11
AdvicePermalink