Subscribe
  • Home
  • /
  • TechForum
  • /
  • Protecting data, devices in the age of mobility and cloud computing

Protecting data, devices in the age of mobility and cloud computing

By Lionel Moyal, Office Business Group Lead at Microsoft South Africa.


Johannesburg, 12 Feb 2018

Digital transformation is touching every sector, industry and organisational size, with SMEs being empowered by digital technologies, such as hyperscale cloud computing, to gain enterprise-grade services and compete for the same customers as big corporations.

While the digital era presents many opportunities for companies, it is also producing numerous challenges, including security threats that can be devastating to a company's reputation and bottom line, says Lionel Moyal, Office Business Group Lead at Microsoft South Africa.

Previously, a business could only enable corporate-issued devices on its networks and protect its infrastructure behind a firewall. In the digital era, trends such as bring your own device and mobility have, along with the need to co-create value and collaborate with partners, made isolationism impossible.

In fact, employees are spending a lot (up to 50%) more time in collaborative activities, while research company Strategy Analytics forecasts the global mobile workforce will encompass around 1.75 billion in 2020 or approximately 42% of the global workforce. Last year, a whopping 43% of all cyber attacks were targeted at SMEs, according to security software company Symantec.

All of this means companies need to rethink their approach to security, thanks to this myriad Web-connected devices making their way through their offices, with these acting like gateways via which attackers can gain access to the business's network and digital resources.

Using the cloud to be productive anywhere, anytime, on any device, securely

Every quarter, Microsoft provides companies with the latest trends data on industry vulnerabilities, exploits, malware, Web-based attacks, along with measures to combat these and for remediation within its Security Intelligence Report (SIR).

The latest (Q1 2017, January to March) SIR shows the cloud is fast becoming the central data hub for companies, which in turn is also making it a prime target for cyber criminals. Consequently, cloud-based cyber-attacks have increased a massive 300% year-on-year.

When you move your organisation to a cloud service, you must be able to trust your service provider with your most important, sensitive, and confidential data or choose to move only your least sensitive data to the cloud. Because security is paramount for business success, solutions such as Microsoft 365 Business has to offer robust policies, controls, and systems to help keep your information safe.

Companies should take note that as the cyber attackers are successful with their breach attempt, the attackers attempt to re-use the stolen credentials on multiple services. Therefore, one of the most critical things a user can do to protect themselves is to use a unique password for every site and online service they use.

In addition, businesses should train staff to avoid the use of simple passwords (easy to guess or crack), using alternative authentication methods or multi-factor authentication, as well as to implement solutions for credential protection and risk-based conditional access.

Endpoint threat intelligence

An endpoint is any device that is remotely connected to a network, which is able to provide an entry point for cyber attackers and includes notebook PCs, smartphones, and tablets, among others, and because users interact with an endpoint, it remains a key opportunity for attackers and a security priority for businesses.

Ransomware attacks have been on the rise, disrupting major organisations and grabbing global headlines. Attacks like WannaCry and Petya disabled thousands of machines worldwide in the first half of 2017.

Windows 10 includes mitigations that prevent common exploitation techniques by these and other ransomware threats, while tools like BitLocker and Windows Information Protection help protect business data on mobile devices, by ensuring all business data is encrypted and accessible only by authorised users. Furthermore, SMEs can perform a remote selective wipe of company data easily on lost or stolen devices and centralise control of company data on personal devices.

Managers can also help prevent accidental data leaks by securely separating business information from personal information by using tools like Windows Information Protection. They can ensure that employees always have access to files while confining company information to Office apps, by employing capabilities such as App Protection for Office mobile.

Ultimately, businesses need a new, integrated approach to security in the digital era, which will not impede their productivity. Solutions such as Microsoft 365 Business are integrated and bring together productivity tools that staff will already be familiar with, along with the security and device management capabilities that small to medium-sized businesses need to protect their data.

Share