This page contains a Flash digital edition of a book.
34 . Glasgow Business October 2015


Risk of personal devices


Most IT security strategies correctly focus on protecting the perimeter of the company network; the points at which it touches third-party networks and the open Internet. While mobile working has blurred traditional ideas of where this perimeter sits, the rapid rise of ‘bring your own device’ (BYOD) culture has punched it full of holes. For a business, the idea of


employees using their own smartphones, laptops and other devices has an obvious appeal, as it saves money while potentially making those employees more productive. Yet the security implications of allowing unknown devices access behind that


protective perimeter are numerous. Alun Borland, director of Glasgow- based IT and security consultants Stratiis, says: “The benefits of BYOD are clear, but businesses must update their policies and practices to account for the associated risks. “Enforcing strict log-in and


authentication procedures, for example, provides boundaries for company network access, while still giving employees the freedom to use their own devices. As we’ve seen in the web services from the likes of Google, Microsoft and many banks, two-layer authentication – in which a second piece of information is required in addition to a password – is swiftly becoming the norm.”


HOW RESILIENT IS YOUR BUSINESS?


144% increase in successful cyber attacks on business in 2015


93% of data protection breaches caused by human error


98% of web apps vulnerable to attack


90% of large organisations reported security breaches


Stratiis are experts in IT and Cyber Security and Resilience


For advice on how to secure your business from cyber threats and how to manage business impact please contact us for a free audit today:


0845 644 0771


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60