Story image

IT managers face increased scrutiny to secure a company's network, says exec

24 Mar 2017

Organisations can no longer afford to risk the financial and reputational impacts of a breach, which can be too much for a business to recover from.

That’s according to Mark Blower the national business manager of Networks & Security at Empired.

He says that IT managers face increasing scrutiny and pressure from CEOs, managing directors and boards to prove that they are keeping the organisation secure.

While businesses still face threats from infected devices and malware, Blower explains that attackers have also moved beyond that.

“This means we are seeing an increase in compliance audits so that IT managers have something tangible to show senior management and boards,” he says.

“An ISO audit, for example, can demonstrate that organisations have the right policies, educated staff and the right security technology, and can enforce policies or report on people that are breaking their policies.”

According to Blower, the IT policy is a critical component of an organisation’s security strategy.

“IT managers need to have policies regarding which devices can connect, when they can connect, and how staff members can get approval to connect devices,” he says.

“Furthermore, they haven’t implemented the right policies from the start before taking on new technology.”

Blower explains that when under scrutiny, it can be tempting to just take on more technology -  but this doesn’t necessarily address the problem and can create a mix of technology that follows different standards.

“To ensure they can prove their security measures are adequate, IT managers should conduct an audit to see where security is lacking and then invest to update any technology as appropriate to enforce these policies,” he says.

“Once this is in place it is important for IT managers to continually conduct audits to find issues, improve and remediate.”

GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.