Staff Side-stepping Security Protocols Could Leave Your Business Vulnerable, Says ESET

Staff Side-stepping Security Protocols Could Leave Your Business Vulnerable, Says ESET

SINGAPORE, July 8, 2015 /PRNewswire/ — For those who are less familiar with the cybersecurity space, some of the rules proposed by businesses trying to stay safe, can seem like they are designed just to make life difficult. Not being able to download applications or have access to certain websites, as well as an emphasis on strong passwords and complications around working remotely, are just some of the common issues employees in businesses across Asia Pacific have to deal with.

It’s unsurprising then that we are seeing a rise in what’s known as ‘Shadow IT’ — or employees using apps, cloud services, software and devices which are outside the knowledge and control of the CIO and IT staff. In a recent study, PwC estimates that somewhere between 15 percent up to 30 percent of IT spending now occurs outside the standard consolidated budget of the IT department. The Cloud Security Alliance (CSA) revealed in its 2015 report that nearly 72 percent of executives and IT managers surveyed in APAC and the rest of the world, admitted that they did not know the number of Shadow IT apps within their organisation.

“This a real issue for businesses of all sizes,” says Parvinder Walia, Sales Director for ESET Asia Pacific. “On the one hand it’s important for businesses of all sizes to have the security solutions and protocols in place to protect their assets and it must always be remembered that people are any business’ first line of defence, so making sure staff are up-to-date on best practices is a must. It’s equally important however to ensure that what you have in place and the information being provided to employees isn’t over complicating the situation, which could encourage staff to sidestep rules and regulations in order to avoid a loss in productivity.

Parvinder highlights the need for CIOs and IT department to take charge and really understand the situation from their employee’s perspective in order to find a solution that allows people to work effectively, without leaving the business vulnerable.

“Finding a happy medium is crucial, says Parvinder, “in allowing employees to take advantage of technology that drives productivity and business growth, without compromising the security of the network. By understanding which apps, websites and other behaviours staff find useful to complete their work effectively and efficiently, it should be possible to work out bespoke solutions and approaches to protocol that provides the best of both worlds.”

There are however some things, as Parvinder points out, that should not be overlooked, and need to be communicated clearly and regularly to employees in order to ensure that systems and data remain protected. “The need for complex passwords is something that people often moan about, even to the point of sidestepping the rules. This is often the case with top level management, who often have the attitude that it doesn’t apply to them. This always scares the life out of me because in theory they’re the people with the most to lose.”

Still, following the password rules doesn’t have to be hard to be safe, according to Parvinder. “Just because you have a pattern, doesn’t mean that pattern can be guessed. When computers bruteforce passwords, they’re unable to look at patterns. You could use the same sort of song title or film description and put unique things in for that website or login.

“On top of this, passwords should always be reviewed, although it is dependent on circumstances. If you use two factor authentication, you could potentially compromise. If username and password is your only means of protection, it should be changed at least every 30 days, as if a hacker is doing their job right, you’re not going to know they’ve got the username and password, so the sooner it’s changed, the better.”

The need for applications to be screened and installed by IT departments is possibly the easiest one for anyone to understand, says Parvinder. “Even those with a basic knowledge of business security and malware should be aware that many free applications on the internet carry serious risks. But this needs to be made clear and there really needs to be a degree of what can and can’t be installed in the workplace, but the reasoning needs to be explained.”

Parvinder believes that a simple explanation of the business security policy and assistance in finding alternatives is the best way to ensure everyone is happy. “If users and staff are up against technical people, that’s when people don’t do things because it’s too much hassle.

“A final common issue is difficulty in working remotely — a clear problem, given we now live in a world of flexible hours and 24 hour business,” says Parvinder.

The right policies means this doesn’t need to be a difficult scenario, explains Parvinder. “It’s not a difficult thing to get up and running. This would be a company laptop, a good secure means of gaining communication, setting up an encrypted VPN, setting up two factor authentication and making sure the security is up to scratch.” Aside from that, as long as workers are educated in what they can and can’t do, and where they can and can’t login from, Parvinder is confident that most employers and employees will be happy.

The way Parvinder describes it, none of these personal issues should be a seriously difficult problem for companies to fix, with the right education and communication in place. “Technology is an incredible tool and one that all businesses should embrace in order to optimise their workforce, services and solutions, however security is the underlying enabler that cannot be overlooked. And this doesn’t end by having a security solution in place. Ultimately, people are an organisation’s first line of defence, so getting the team on board and up-to-speed is what will make the real difference.”

SOURCE ESET

CONTACT: Munirah Razak; eset@ricecomms.com; +65-3157-5679