Welcome!

@CloudExpo Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Zakia Bouachraoui, Elizabeth White

Blog Feed Post

Keeping business security wrapped up this Christmas

London, 26 November 2012 - In the run up to Christmas, businesses need to ensure that they have checked their list twice when it comes to IT security. Not only do employees browse for Christmas gifts online during their lunch breaks, but an increasing number of people work remotely over the festive period.

Employees can unknowingly put their business at risk from the inside by inadvertently opening the door to a virus or spyware, which can have devastating consequences to a business and its customers.

Jeff Finch, head of security at Interoute, reveals some top tips to help businesses think more laterally about how to protect themselves this time of year:

  1. Shop around
    Whatever the size of your business; you don't have to plunder the Christmas party fund to afford proper protection during the festive season. Smaller businesses can be an easy target because they are less likely to invest in the most expensive corporate solutions. However, there are plenty of cost effective options to be had for the savvy shopper. Look for reputable antivirus, anti-spyware and anti-spam packages that will block hackers when installed across all corporate devices. Of course, the best and most cost effective option is to have security built into your network if you want to stop cyber-attacks at the source.

  2. Consider the cloud
    Father Christmas isn't the only one who can travel around the world at the speed of light. The cloud has made storing data and accessing Apps from anywhere much easier. Partnering with a cloud provider whose service is optimised for high security standards can strengthen the safety net around your data. However, make sure you take control of your data in the cloud by choosing a trusted provider who is open with you about where your data is held and how this may change. Ensure that you can decide where your data is stored and how it is moved, and choose a provider who will offer you a robust SLA and has a proven track record.

  3. Education is the perfect gift
    Enforce a thorough internet security policy for employees that covers threat management across PC, mobile and social media activity. It is imperative that employees understand the risk that cybercrime poses and the costly consequences of a breach during the Christmas period, in order to motivate adherence to the guidelines you provide.

  4. Take responsibility
    It may sound simple, but ensure that someone within your organisation is taking responsibility for monitoring the current security threats. Patching software and making staff aware of the latest scams will ensure that full protection is maintained and no chinks in your security armour go unnoticed.

  5. Stay one step ahead of BYOD
    Whilst, of course, it is essential to implement adequate protection at the business edge, it is equally important to ensure that employees aren't unwittingly putting the business at risk. Research earlier this year revealed that nearly one in two small businesses have experienced a security breach caused by staff. With the growing popularity of Bring Your Own Device (BYOD), employees intending to take new gadgets from their Christmas stockings into the corporate environment need guidance on how to do this without compromising business security.

  6. Protection for remote workers
    The same security rules apply for all employees, whatever their working environment this Christmas. Make sure you take the necessary precautions to protect staff that are accessing the corporate network and applications outside the office. Working smarter and more securely on the move requires the likes of endpoint protection, along with a closely maintained corporate data usage policy.

About Interoute
Interoute Communications Ltd is the owner operator of Europe's largest cloud services platform, which encompasses over 60,000 km of lit fibre, 9 hosting data centres and 32 collocation centres, with connections to 140 additional third-party data centres across Europe. Its full-service Unified ICT platform serves international enterprises, as well as every major European telecommunications incumbent and the major operators of North America, East and South Asia, governments and universities. These organisations find Interoute the ideal partner for computing, connectivity and communications and developing new services. Its Unified ICT strategy has proved attractive to enterprises looking for a scalable, secure and unconstrained platform on which they can build their voice, video, computing and data services, as well as service providers in need of high capacity international data transit and infrastructure. With established operations throughout mainland Europe, North America and Dubai, Interoute also owns and operates dense city networks throughout Europe's major business centres. www.interoute.com

PR contact:
Interoute
Ruth Jones
Speed Communications
+44 (0) 20 7842 3200
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

CloudEXPO Stories
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buyers learn their thoughts on their experience.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Jo Peterson is VP of Cloud Services for Clarify360, a boutique sourcing and benchmarking consultancy focused on transforming technology into business advantage. Clarify360 provides custom, end-to-end solutions from a portfolio of more than 170 suppliers globally. As an engineer, Jo sources net new technology footprints, and is an expert at optimizing and benchmarking existing environments focusing on Cloud Enablement and Optimization. She and her team work with clients on Cloud Discovery, Cloud Planning, Cloud Migration, Hybrid IT Architectures ,Cloud Optimization and Cloud Security. Jo is a 25-year veteran in the technology field with tenure at MCI, Intermedia/Digex, Qwest/CenturyLink in pre-sales technical, selling and management roles.