WHY IT MATTERS: Digital Transformation
215.2K views | +55 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'IT'. Clear
Scooped by Farid Mheir
Scoop.it!

When Your Employees Post Passwords Online in public Trello boards and other public SaaS solutions you may have serious data security issues via @brianKrebs #KrebsOnSecurity

When Your Employees Post Passwords Online in public Trello boards and other public SaaS solutions you may have serious data security issues via @brianKrebs #KrebsOnSecurity | WHY IT MATTERS: Digital Transformation | Scoop.it

Last month’s story about organizations exposing passwords and other sensitive data via collaborative online spaces at Trello.com only scratched the surface of the problem. A deeper dive suggests a large number of government agencies, marketing firms, healthcare organizations and IT support companies are publishing credentials via public Trello boards that quickly get indexed by the major search engines.

Farid Mheir's insight:

WHY IT MATTERS: this article is a reminder that the use of public software as a service tools may lead to exposure of critical and private corporate data. In the past, locking everything down behind corporate firewall and network meant this was not possible. At the same time, remote work and collaboration with partners around the globe was very difficult. CIOs would like to return to the good old days but users certainly do not want that. Proper governance must be enforced with these new tools and systems.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

2016 Trusted Access Report: The current state of device security health

2016 Trusted Access Report: The current state of device security health | WHY IT MATTERS: Digital Transformation | Scoop.it

5 key recommendations

  1. Don’t reject BYOD — be prepared for it. Give your IT administrators actionable data on device ownership and health that can inform risk-based access control decisions.
  2. Encourage safe computing practices and good security hygiene, such as running regular security updates or using device encryption, passcodes and additional authentication to protect systems and data.
  3. Configure systems and deploy policies that enable automatic updates for as much software as possible to remove some of the friction that users feel when manually installing updates. We found that an overwhelming number of out-of-date browsers and systems don’t take basic steps like enabling automatic updates.
  4. Switch to browser platforms that update more frequently and automatically, like Google Chrome.
  5. Disable Java and prevent Flash from running automatically on corporate devices, and enforce this on user-owned devices through endpoint access policies and controls.
Farid Mheir's insight:

DUO security publishes a report on security findings from over 2M devices its software is installed on and provides recommendations from its findings

 

WHY THIS IS IMPORTANT

Security is better, it seems, when users use software that update themselves automatically. Unfortunately, because enterprises have to pay to keep software up to date, most computers are out of date from a security standpoint. Leaders should prioritize keeping systems up to date or favour solutions with automated and free updates. As the paper describes, there are many out there, you just have to look for them carefully.

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/