Story image

IT managers face increased scrutiny to secure a company's network, says exec

24 Mar 17

Organisations can no longer afford to risk the financial and reputational impacts of a breach, which can be too much for a business to recover from.

That’s according to Mark Blower the national business manager of Networks & Security at Empired.

He says that IT managers face increasing scrutiny and pressure from CEOs, managing directors and boards to prove that they are keeping the organisation secure.

While businesses still face threats from infected devices and malware, Blower explains that attackers have also moved beyond that.

“This means we are seeing an increase in compliance audits so that IT managers have something tangible to show senior management and boards,” he says.

“An ISO audit, for example, can demonstrate that organisations have the right policies, educated staff and the right security technology, and can enforce policies or report on people that are breaking their policies.”

According to Blower, the IT policy is a critical component of an organisation’s security strategy.

“IT managers need to have policies regarding which devices can connect, when they can connect, and how staff members can get approval to connect devices,” he says.

“Furthermore, they haven’t implemented the right policies from the start before taking on new technology.”

Blower explains that when under scrutiny, it can be tempting to just take on more technology -  but this doesn’t necessarily address the problem and can create a mix of technology that follows different standards.

“To ensure they can prove their security measures are adequate, IT managers should conduct an audit to see where security is lacking and then invest to update any technology as appropriate to enforce these policies,” he says.

“Once this is in place it is important for IT managers to continually conduct audits to find issues, improve and remediate.”

The secret to scaling DevOps in the digital era
"Organisations around the world have learnt at a cost that while agile DevOps methodologies can result in improved outcomes within teams and projects, they have a propensity to fail miserably."
APAC FinTech network launches to encourage cross-border innovation
Nine associations formally launched the network by signing a Statement of Intent at the Asian Financial Forum event in Hong Kong.
New blockchain solution aims to keep our food ethical
OpenSC enables anyone to scan product QR codes which automatically takes them to information about where a specific product’s journey.
Avaya expands AI offerings with new partnerships
The additions to the ecosystem will enable Avaya to add prioritisation and natural language processing to its UC solutions.
Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
SUSE partners with Intel and SAP to accelerate IT transformation
SUSE announced support for Intel Optane DC persistent memory with SAP HANA.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."