Freedom from security

April 2005 Cyber Security

Ian Schenkel, MD of Sygate EMEA, illustrates the security headaches that organisations face in the battle to enable mobile working, and puts forward a remedy that will ensure the integrity of corporate devices and the corporate network.

Enterprises are no longer restricted to the networked systems bounded by the building in which the company is housed. Modern enterprises span the globe and employees can easily access the corporate network from outside the office, opening many more productivity channels. The proliferation of broadband has enabled home working to become an economically viable option while the dramatic fall in the price of laptops allied with the explosion in WiFi technology has made mobile working the norm for many companies.

Recent figures from the UK Labour Force Survey have revealed that over 25% of the UK workforce have taken advantage of the capability to work at home, and Datamonitor recently suggested that 2005 will see 40 million Europeans working from home with the UK leading the trend with 8,3 million home workers. The percentage of the UK workforce regularly using mobile devices such as laptops will undoubtedly dwarf this number, as organisations capitalise on the business benefits that mobile working provides. However, with this liberation comes an associated security risk.

The ability for a company to enforce corporate security policy diminishes severely once a computer is used outside of the office. For example, if a worker takes a company laptop for a week, who is responsible for ensuring that corporate security policy is followed when the machine is being used? It is very rare to find an employee who knows what the company security policy is, not to mention understands what the implications might be if it is not followed. So who is going to warn the worker when they forget to upload a critical patch, or decide to disable the anti-virus from time to time, or use an unauthorised instant messaging application, or load games and songs? Who is going to be able to stop the employee's children from using the laptop to trade files over peer-to-peer software?

The answer, of course, is no one. The user will likely be unaware of the many security threats that are out there, such as spyware, Trojan horses, viruses and worms. They will also be blissfully ignorant of the fact that the next time the device connects to the corporate network the security threat will be passed on to the company.

The cost of network security failure cannot be ignored. Cybercrime cost UK businesses hundreds of millions of pounds in downtime, remediation costs and lost business last year. For example, the Sasser worm that was unleashed at the end of April last year crashed hundreds of thousands of computers worldwide after rapidly spreading over the Internet. Sasser did not require users to receive an e-mail message or open a file to be infected. Instead, just having a vulnerable Windows machine connected to the Internet was enough to get infected.

Most organisations understand that there are numerous security threats in the wild and have developed and written security policies in an attempt to preserve the integrity of their network, but how many are actually able to enforce the policy? If most employees are unaware of what the company security policy is, let alone understand how to enforce it, then there should be an alternative method of enforcing policy where the 'security thinking' is not the responsibility of each and every worker.

What is vital then is that there is a mechanism in place that prevents vulnerable machines from passing any threat on to the rest of the network. A mechanism that ensures the security policy does its job and that only devices in a trusted state are allowed to connect with the corporate network. Technology is now available that can do just this - 'insist' on the full integrity of any machine before it is allowed to connect to the network. No matter where a device is physically or how it is connected, if its security levels are not compliant with those set out in the security policy then it will be quarantined outside the network until it has automatically been brought up to the required level of protection. This keeps individual machines and the corporate network fully compliant at all times, ensuring that as long as the security policy is watertight, so is the network.

By taking responsibility away from the user and automating the enforcement of security policy, the CIO is provided with the peace of mind that policy is being implemented and maintained on every single machine and employees benefit by being able to focus more closely on their work without having to concern themselves with security matters. In this way full compliance is achieved across all users and a corporate security policy can be truly effective.

For more information, please visit www.sygate.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NIST’s impact on cybersecurity
Cyber Security
Through its NIST Cybersecurity Framework, the non-regulatory agency empowers organisations to take a proactive approach towards managing and mitigating cyber risks, enabling them to stay resilient against the ever-evolving threat landscape.

Read more...
Best practice tips for strengthening data privacy system
Security Services & Risk Management Cyber Security
International cybercriminals are increasingly targeting South African organizations, making data privacy more difficult to maintain. A standardization expert offers insight to help combat this threat.

Read more...
AI-powered cyber protection for consumers
IT infrastructure Cyber Security
Acronis Cyber Protect Home Office is designed for the evolving landscape of cyber threats by integrating Acronis' cyber protection and secure backup solutions, combining AI-powered defence mechanisms, robust data backup, remote management tools, and mobile device protection.

Read more...
A surge of cybersecurity for the energy sector
Government and Parastatal (Industry) Cyber Security
With a rapid transition towards renewable energy, the energy sector has an increased reliance on technology. This makes it particularly vulnerable with regards to cybersecurity, as it depends on interconnected systems and digital technologies.

Read more...
Secure backup strategies imperative for business continuity
IT infrastructure Cyber Security
Cybercrime is on the rise, and businesses need to adjust how they manage their data to fend off attackers, or risk irreparable damage, writes Lisa Strydom, Senior Manager Channel and Alliance for Africa at Veeam Software.

Read more...
CHI selects NEC XON as trusted cybersecurity partner
News Cyber Security Industrial (Industry)
CHI Limited, Nigeria's leading market player in fruit juices and dairy products, has engaged in a strategic cybersecurity partnership with NEC XON, a pan-African ICT systems integrator.

Read more...
Mitigating escalating DDoS cyberattacks
Cyber Security
As cyberattacks, particularly those of the Distributed Denial of Services (DDoS) variety, continue to rise at an unprecedented rate across Africa, it is no longer a question of ‘if’ your organisation will be targeted, but rather ‘when’.

Read more...
Six effective antidotes to modern cyber adversaries
Cyber Security
As the head of cybersecurity at NEC XON, Armand Kruger has witnessed the transformation from hooded hackers to a sophisticated dark economy that poses unprecedented threats and is run like a business.

Read more...
Key strategies for businesses in the face of cyber threats
Cyber Security Security Services & Risk Management
Businesses face severe financial and reputational consequences due to data breaches and daily website hacks, and not all organisations are adequately prepared to combat these escalating threats.

Read more...
Cyberattacks are inevitable for small businesses
Cyber Security
The recent cyberattack on Microsoft is a stark reminder that no organisation, regardless of its size or industry, is immune to cyber threats. Even small businesses, often assuming they are less attractive targets, are vulnerable.

Read more...