It would be impossible to have missed the significant increase in the number of companies who have had their proprietary and valuable data compromised by unknown individuals maliciously penetrating their networks without being spotted, stealing millions of sensitive data records, and the damage only being comprehended when the details of the e-heist go public.

From Sony to TalkTalk, and Ashley Madison to Mossack Fonseca, the immediate damage is obvious and painful and the collateral pain goes on.

In the next few months we will be asking a number of key questions about your ongoing cyber security.

Today, the question is; Is yours an open door and window network and why is this a problem?

With multiple devices now being connected to the internet as a matter of course for both their operation, convenience of use, and for their owners remote access, this implicit trusting behaviour opens you up to a myriad of potential vulnerabilities and threats, and the relentless attack of persistent brute-force. Most of us know what is meant by IoT, and according to Verizon the number of B2B IoT devices is expected to expand to 5.4 billion devices by 2020, compared to that of 1.2 billion in 2015 (Source: Verizon/ABI Research, 2015) a four-fold increase. Poorly secured IoT devices leave you and your business extremely vulnerable to cyber-attacks.

So, what should you consider?

  • Any and all data you store, transmit or rely upon for business continuity must be securely encrypted, robustly defended and reliably archived.
  • “Harden” any and all devices that connect to the internet and reside within your business to ensure that they are configured to ONLY do what you expect, and ONLY what is needed of them.
  • Determine what devices are being used and more importantly how the data is being used and set and police both device and user policies.
  • Creating an effective human Firewall by education, education and more education.

Here at Axial, we have amassed a wealth of experience focused on securing your data at rest and in use, as well as managing your data in motion, and ensuring the data-openings in your business are secure and monitored. Get in touch to see how we can help you and your business stay secure.

Look out for next month’s blog – Pay up or Else!