Don’t let summer holidays scorch network security

With secure on and off-boarding systems in place, as well as complete visibility into network endpoints, IT teams can depart on their own summer vacations knowing that endpoints are patched, vulnerabilities are taken care of, and that their network is secure

 

It’s no secret that more than ever, employees struggle to maintain a healthy work-life balance – even when they’re on vacation. Some people can’t help themselves but check work emails while running their toes through the sand.

Who will scorn them for being a duteous worker? No one, but the company’s IT team because this “super-employee” is accessing accounts and information on an unpatched and vulnerable device from a remote location. So why can’t IT teams take a chill pill when it comes to summer vacation network security?

Unpatched and unmanaged (usually personal) devices provide hackers with a gateway to the corporate network, as well as the possibility of accessing files, accounts and more. Even when an employee is innocently checking their email from the beach, access over free or unsecure Wi-Fi networks creates the possibility for hackers to clone accounts, thereby gaining access to sensitive company information.

>See also: UK companies failing to educate employees on cyber security

Access from remote locations put organisations at risk by increasing their exposure to foreign cyber attacks. That’s why it’s important for IT teams to verify that their corporate endpoints are patched with the latest OS version, anti-virus updates, and are encrypted before their employees travel. In addition, it’s important to ensure, as much as possible, that work isn’t conducted on personal devices, no matter the emergency.

Another reason that summer vacations worry IT teams is that employees often decide to take their corporate devices with them. Out of a desire to stay in the know, or keep their Inbox in check, employees may plug into their device while away from the office, which puts information…

Read the full article from the source…

Leave a Reply

Your email address will not be published. Required fields are marked *