Is your computer security policy really keeping your data safe?

 2017-01-25 11:50 AM by
Is your computer security policy really keeping your data safe?

It's probably safe to say that the vast majority of businesses have some form of computer security in place. It's probably also a safe bet to say that most companies' computer security policy is limited to an anti-virus and anti-malware solution, perhaps allied with a firewall that's been configured to filter out spam as far as possible.

 

However, even with these computer security measures in place, companies are still losing data or having data stolen. Why is this?

Not all anti-virus and anti-malware applications include device control facilities.

Effective computer security must include device control; the ability to prevent unauthorized personnel from transferring or copying company data to a flash drive or other removable media and thereby taking the data off-site.

Basic computer security solutions almost never include web-filtering functionality.

Why is this important? Well, we all have permanent internet access - you can't effectively work without the internet these days. This means that people are always able to connect to any website. Besides the productivity-killing aspect of this - employees engaging in social media, downloading music and video etc. - uncontrolled web access exposes your corporate network to serious computer security breaches when 'unsavoury' websites are accessed.

A further aspect of computer security, related to web filtering that must be considered is the potential for customers to become aware that your employees are accessing unacceptable content such as porn - this can easily compromise a reputation and brand image that's taken millions of Rands and years of effort to establish.

If you're committed to an effective computer security policy, you should only be considering a cloud-based computer security solution.

Cloud-based computer security solutions are always accessing a fully comprehensive virus and malware database that is continually being updated as new threats are discovered. It's impossible for traditional, on-premise desktop-based computer security solutions to retain every known current and historical threat in a local database. This means that desktop or corporate server based computer security solutions leave your company vulnerable to infection from both the very latest threats as well as old threats which may have been 'dropped' from the most recent pattern update download.

No matter how good your computer security is, data can be deleted or sabotaged by disgruntled employees.

Unfortunately, incidences where business owners need to restore data that has been deleted by disgruntled employees are a common occurrence.

No matter how good your computer security is, computing devices and data can be lost due to natural disasters and theft.

Once again, many business owners are affected by either of these data loss scenarios frequently.

Your computer security policy should include mobile device control.

You may feel that having computer security on your desktop and laptop computers is sufficient. What about the proliferation of mobile devices that are easy to misplace or have stolen, such as tablets and smartphones? Most employees receive emails and other data on their mobile devices. If a device is stolen or lost, your company data is immediately compromised.

It comes down to this: no matter how good your computer security policy is, it can still be breached.

So, what's the answer?

Implement a computer security policy that enables you to detect and prevent infection from all known virus and spam ware threats, allows you to control access to devices and preclude the transfer of corporate data to removable media devices and that enables web filtering. Ensure that you have an effective off-site data backup solution in place that automates daily data backups and stores the data in an encrypted form on a server array in a secure data centre.

The most effective computer security solutions in this regard are cloud-based security solutions.

To learn more about online backup solutions, download our White Paper here or read some of our recent posts on our blog.