8

iTWire - Protecting your strategic information: Veeam's top four steps

 3 years ago
source link: https://www.itwire.com/business-it-news/data/protecting-your-strategic-information-veeam-s-top-four-steps.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Wednesday, 16 December 2020 17:09

Protecting your strategic information: Veeam's top four steps

By Alex Zaharov-Reutt
Veeam's Rick Vanover is pictured

Veeam's Rick Vanover is pictured

With the COVID-19 pandemic shifting the spotlight back on the pesky security issue plaguing companies for years, that being of workers connecting to corporate networks from an ever growing number of devices, how does Veeam suggest you handle this issue?

Veeam. The company says it is a "leader in backup solutions that deliver Cloud Data Management", and says it "provides a single platform for modernising backup, accelerating hybrid cloud and securing your data".

Founded in 2006, the company proudly boasts of over 400,000 customers, more than 70,000 partners, doing business in 160 countries with offices in more than 35, and with over US $1B in revenue.

The company's Senior Director of Product Strategy, Rick Vanover, has written a blog post that talks about the worsening problem of so many devices connecting to corporate networks, something that has only accelerated during the pandemic, and notes that "moves to protect, manage and back up the sensitive information in those networks aren’t keeping pace".

Indeed, Vanover tells us that "the problem’s getting worse", pointing to studies that "show the number of connections spiked suddenly during the pandemic, as workers handle more mission-critical tasks from remote locations".

Then there's the problem of "rogue, shadow IT" continuing to intensify year after year, which has seen IT departments, already stretched thin by pandemic-related layoffs, having to "scramble to do more with less at a time when threats are getting more serious".

"That’s not all", warns Vanover, who states that "workers are not only hooking up more laptops, tablets and phones to give themselves more work flexibility – they’re getting sloppier about the way they manage the connections under their control.

"They’re replacing devices more quickly than they used to, upgrading phones every year or two. But consumers don’t always wipe their old phones clean when they give them away, sell them or trash them. The data from that confidential presentation doesn’t go away by itself".

Naturally, hackers are watching this trend closely – and capitalising on it, and "rather than storm a corporate network with a 'Game of Thrones'-style, all-out attack, hackers prefer to find an unguarded endpoint, slip into a network, poke around and pilfer assets quietly before setting off any alarms".

So, what does Veeam's Vanover advocate as advice that validates his views, so we can all emerge victorious in the vigilant voyage to secure valuable company networks and data?

Well, Vanover starts off by telling us all that: "It’s time for organisations and workers themselves to step up. They need to protect data and ensure it’ll be there for future use by backing it up. But it can’t stop there.

"Backups have to be part of a larger strategy that includes things like two-factor authentication and more dedicated use of VPNs. As they say, 'If you connect it, protect it'."

Here are Vanover's "four key cybersecurity strategies businesses and employees can deploy to protect and manage the growing issues imposed by the era of ultra-connectedness".

1. Strengthen your remote access strategy

This is “job one” for IT departments – especially with remote work promising to play a bigger role in the future. Equipping corporate networks with VPNs for sensitive data is a good start. Just as important is the follow-through.

Sophisticated role-based management tools can enable employees to work productively while also blocking them from accessing information outside of their assigned areas or sharing strategic documents. Train employees in the do’s and don’ts of accessing information remotely, and regularly review your strategy to ensure it’s meeting your corporate needs.

2. Manage devices ‘from cradle to grave’

Too much sensitive information is sitting on devices waiting to be had. IT departments need to take the lead on any corporate-issued phones and laptops – equipping them with security features up front and doing thorough wipe-downs before issuing to a new user.

This goes for loaner devices, as well. Workers connecting to network information need to do their part, too. Kill old corporate emails from home devices, and before selling or destroying models make sure to purge any materials.

3. Use encryption and Two-Factor Authentication

Security breaches are all too common – and most are preventable. Basic steps like encrypting sensitive documents can protect consumers from disaster scenarios where customer data or a highly classified report inadvertently falls into the wrong hands.

Passwords provide a moderate level of protection – and, if they’re updated regularly and managed properly, they can do the job. But if you’re accessing important information that could compromise the company in any way, equipping all private devices with two-factor authentication is a better option.

4. Doubling down on diligence

Phishing forays aren’t new, but they’re still dangerous. In an era where corporate assets are increasingly at risk, and hackers are waiting for that one opening to slip through, it’s important for workers to remind themselves to be more diligent than ever.

IT departments can circulate refresher notes and conduct periodic trainings reminding people to exercise basic cautions like don’t enter credentials online, don’t click on documents from unknown sources and when in doubt contact IT. Keep the time-tested slogan in mind: “Trust but verify.” You don’t want to find out the hard way that a communication isn’t what it appears to be.

So, there you have it. Rick Vanover's advice is well worth veering toward, as he clearly a versatile Veeam veteran with the right vantage point to help companies be veritably protected, so as to never become vulnerable victims, but valiant vessels of virtuous value to make the world a better place for us all, while protecting company and customer assets valiantly well. 

Here's a couple of interesting Veeam videos from its YouTube page: 

This next video is from eight months ago, Veeam counts over 400,000 customers today, so the company has clearly had some good growth over the past several months of the COVID-19 pandemic! 

Subscribe to ITWIRE UPDATE Newsletter here

Now’s the Time for 400G Migration

The optical fibre community is anxiously awaiting the benefits that 400G capacity per wavelength will bring to existing and future fibre optic networks.

Nearly every business wants to leverage the latest in digital offerings to remain competitive in their respective markets and to provide support for fast and ever-increasing demands for data capacity. 400G is the answer.

Initial challenges are associated with supporting such project and upgrades to fulfil the promise of higher-capacity transport.

The foundation of optical networking infrastructure includes coherent optical transceivers and digital signal processing (DSP), mux/demux, ROADM, and optical amplifiers, all of which must be able to support 400G capacity.

With today’s proprietary power-hungry and high cost transceivers and DSP, how is migration to 400G networks going to be a viable option?

PacketLight's next-generation standardised solutions may be the answer. Click below to read the full article.

CLICK HERE!

WEBINAR PROMOTION ON ITWIRE: It's all about webinars

These days our customers Advertising & Marketing campaigns are mainly focussed on webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

We have a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you.

MORE INFO HERE!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK