Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

Blog Feed Post

Keeping business security wrapped up this Christmas

London, 26 November 2012 - In the run up to Christmas, businesses need to ensure that they have checked their list twice when it comes to IT security. Not only do employees browse for Christmas gifts online during their lunch breaks, but an increasing number of people work remotely over the festive period.

Employees can unknowingly put their business at risk from the inside by inadvertently opening the door to a virus or spyware, which can have devastating consequences to a business and its customers.

Jeff Finch, head of security at Interoute, reveals some top tips to help businesses think more laterally about how to protect themselves this time of year:

  1. Shop around
    Whatever the size of your business; you don't have to plunder the Christmas party fund to afford proper protection during the festive season. Smaller businesses can be an easy target because they are less likely to invest in the most expensive corporate solutions. However, there are plenty of cost effective options to be had for the savvy shopper. Look for reputable antivirus, anti-spyware and anti-spam packages that will block hackers when installed across all corporate devices. Of course, the best and most cost effective option is to have security built into your network if you want to stop cyber-attacks at the source.

  2. Consider the cloud
    Father Christmas isn't the only one who can travel around the world at the speed of light. The cloud has made storing data and accessing Apps from anywhere much easier. Partnering with a cloud provider whose service is optimised for high security standards can strengthen the safety net around your data. However, make sure you take control of your data in the cloud by choosing a trusted provider who is open with you about where your data is held and how this may change. Ensure that you can decide where your data is stored and how it is moved, and choose a provider who will offer you a robust SLA and has a proven track record.

  3. Education is the perfect gift
    Enforce a thorough internet security policy for employees that covers threat management across PC, mobile and social media activity. It is imperative that employees understand the risk that cybercrime poses and the costly consequences of a breach during the Christmas period, in order to motivate adherence to the guidelines you provide.

  4. Take responsibility
    It may sound simple, but ensure that someone within your organisation is taking responsibility for monitoring the current security threats. Patching software and making staff aware of the latest scams will ensure that full protection is maintained and no chinks in your security armour go unnoticed.

  5. Stay one step ahead of BYOD
    Whilst, of course, it is essential to implement adequate protection at the business edge, it is equally important to ensure that employees aren't unwittingly putting the business at risk. Research earlier this year revealed that nearly one in two small businesses have experienced a security breach caused by staff. With the growing popularity of Bring Your Own Device (BYOD), employees intending to take new gadgets from their Christmas stockings into the corporate environment need guidance on how to do this without compromising business security.

  6. Protection for remote workers
    The same security rules apply for all employees, whatever their working environment this Christmas. Make sure you take the necessary precautions to protect staff that are accessing the corporate network and applications outside the office. Working smarter and more securely on the move requires the likes of endpoint protection, along with a closely maintained corporate data usage policy.

About Interoute
Interoute Communications Ltd is the owner operator of Europe's largest cloud services platform, which encompasses over 60,000 km of lit fibre, 9 hosting data centres and 32 collocation centres, with connections to 140 additional third-party data centres across Europe. Its full-service Unified ICT platform serves international enterprises, as well as every major European telecommunications incumbent and the major operators of North America, East and South Asia, governments and universities. These organisations find Interoute the ideal partner for computing, connectivity and communications and developing new services. Its Unified ICT strategy has proved attractive to enterprises looking for a scalable, secure and unconstrained platform on which they can build their voice, video, computing and data services, as well as service providers in need of high capacity international data transit and infrastructure. With established operations throughout mainland Europe, North America and Dubai, Interoute also owns and operates dense city networks throughout Europe's major business centres. www.interoute.com

PR contact:
Interoute
Ruth Jones
Speed Communications
+44 (0) 20 7842 3200
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

IoT & Smart Cities Stories
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...