While companies invest a great deal of time and effort in securing their systems, remote and hybrid working has forced businesses and their staff to acknowledge that security goes beyond technology. For all the best technology, a human lapse could result in a catastrophic breach.
Let’s use an analogy that many South Africans will be accustomed to. Security-conscious estates or complexes have varying levels of access control. These complexes have high walls, electric fences, security guards manning key entry points and many – if not all – have security monitoring and patrolling the premises 24/7.
It’s possible that this environment could lull someone into a false sense of security and they’d let their guard down. However, we know that this would be a mistake. Just because the complex or estate boasts these security measures, there are still several ways someone could be at risk.
When they enter and leave the complex, they could become targets of criminals. When they are inside their own unit, they may not be aware of an undetected breach at the estate’s entrance. It is possible criminals are operating from within the secured estate. What if they have adult children going in and out late at night?
Obviously, this is not an exhaustive list of possibilities, but the point is obvious – it would be a mistake to be lulled into taking anything for granted because we understand that security extends beyond the physical measures in place. And so, in the South African context, one invests in physical security and then continually remains aware of risks and behaves in a way to minimise them.
Similarly, securing a company requires a conscious effort and it involves an interplay of people, processes and technology. In a traditional workplace setup, a company can – and will – do all that it can to control its environment. As the pandemic has shown so vividly, this environment no longer exists only in a physical form, yet the requirement to secure it remains.
A company can no longer lock the doors and rely on the fact that access is restricted. Systems need to be accessed remotely and in providing for this you lose control of the environment. As sobering as it is, you must start with the premise that your staff will, at some point, leave their laptop unattended in a public space.
Securing company systems requires protecting your software, protecting your hardware, protecting and backing up your data and the ongoing education of your system’s users. To get this right, it is important to ask - and answer - who is accessing your systems, from where, using what, how and why they are accessing them?
Who is trying to access your systems?
In an ideal scenario, it is your employee attempting to access company systems. However, someone may have stolen login credentials, which would be a targeted and planned attack. Alternatively, it is also possible someone encountered an unlocked device and is opportunistically attempting to gain access. There are various ways to mitigate this risk. User access management is paramount. A company needs strong password policies such as complexity rules and password resetting timetables. Multi-factor authentication adds a layer that could be the difference between being breached or not.
One cannot always rely on an employee to remember to lock their devices every time they are not using them and so auto-lock is crucial. Encrypting external devices such as hard drives and USB sticks is vital – what if an employee leaves a USB stick on a coffee shop table or airport lounge chair?
Where is the employee working from?
Remote working means that an employee must access systems from various locations. In many instances, it will be their home, but they could also be accessing systems from an airport or café. As a priority, organisations should implement virtual private network (VPN) technology to ensure encrypted and private access to the corporate network.
As part of the ongoing education, employees should learn to become aware of their surroundings and the potential for eavesdropping. They should make the care and security of physical assets like laptops a priority. This extends to clean desk policies – nothing should be left lying around, while each employee should understand how to appropriately dispose of printed documents.
What devices are they using to access systems?
As far as reasonably possible, it would be wise to restrict access to company systems from devices other than company-managed assets. It is not ideal for staff to use personal or shared devices. With company-managed assets, a business can invest in central device management software, including the ability to wipe devices remotely. It enables companies to encrypt hard drives, ensure appropriate back-ups are in place and update devices with the latest operating systems and malware and antivirus software.
How is the employee accessing your systems?
While employees may access company systems through their dedicated home fibre, it is also possible they are connecting via public Wi-Fi access points. Again, it can never be overstated – education is paramount. Take the time to teach staff about the dangers of unsecured Wi-Fi and honeypots, as well as being aware and alert to their surroundings. Then reinforce this message consistently.
Why are they accessing the company system?
They may need to access emails and collaboration tools, but it may also be that they work in critical areas such as payments. There are various things a company can do here, including limiting access levels depending on the employee’s job function, monitoring the device activity of staff working in critical areas and running vulnerability scans and penetration tests, which are simulated cyber-attacks against your own system to isolate vulnerabilities that need to be addressed.
Securing a business’s systems is an ongoing task. It is about cultivating a company-wide security mindset as much as it is about investing in the best available technology. Very much like living in South Africa today.
|Tel:||+27 87 805 0000|
|Articles:||More information and articles about Guardian Eye|
© Technews Publishing (Pty) Ltd | All Rights Reserved