Tips on the Side of Caution for Enterprise Connected Devices
Today’s message focuses on cyber-security, diving specifically into how your company can manage risks of using Enterprise Connected Devices (ECDs) and how to also better educate employees in preventing an attack. ECDs are employees issued devices having internet connectivity. Several companies, maybe even your own, utilize enterprise connected devices as they are intended to streamline work related communication and promote higher efficiency in that realm as well. Because these devices are so commonly used in today’s tech-driven world, it is becoming increasingly important to understand how to properly use these devices. A recent report from the Cybersecurity and Infrastructure Security Agency (CISA) analyzed 112 companies for various risks and signs of vulnerability as it relates to their cyber security, within this report containing some valuable advice to better manage ECDs.
Hackers often use ECDs as a starting point for breaching company databases, and these attacks are often launched against those who provide easy access to information by using default security settings. Updating security settings aligned to protect information specific to your company is a crucial first step for you and your employees to protect information on issued devices. Using these devices has also been shown to pose a threat to companies’ supply chains as well. If proper regulations are set and enforced, this issue can easily be minimized. Another method to protect information better is to have your security team set up a series of easy to use Q and A databases that provide an easy access source of education that allow them to explore different options for protecting company-issued devices. Properly utilizing this strategy can take a lot of stress off your security team, which often are over-extended, as well as allowing your employees to educate themselves on security risks.
There is no secret that cyber security risks are increasing each year, so it is important to be proactive rather than reactive as taking the steps to prevent a security attack is far better than having to face an attack.
References:
https://www.jdsupra.com/legalnews/emerging-cyber-risks-in-the-us-uk-3270056