Menu
​Why businesses should design an “inside out” security strategy

​Why businesses should design an “inside out” security strategy

External security threats are a top concern for most businesses, but threats that come from within can blindside an organisation.

External security threats are a top concern for most businesses, but threats that come from within can blindside an organisation.

Consequently, New Zealand organisations need to tailor policies, internal awareness regimes, and security tools to ensure protection from the inside out, as well as the outside in.

“Information is becoming a popular commodity for criminals around the globe, so companies have to do what they can to make sure that information stays safe,” says Stephen Urquhart, General Manager of Australia and New Zealand, Ixia.

“At the same time, our increasingly-connected world is opening up new ways for information to be lost, inadvertently shared, stolen, or appropriated by unauthorised agents. Companies need to protect this information from the inside.”

Going forward, Urquhart has identified three key components to designing an inside out security strategy to keep data safe.

1. Policy

Urquhart believes organisations should build security architecture with multiple layers to protect the areas of the organisation where most of the internal information assets reside.

“It is best if data is encrypted and companies should also implement a tiered permissions identification system,” he says.

“At the same time, businesses should implement an overall corporate security policy that all levels of management support. This helps to make sure everyone is on the same page with practical security measures, such as using stronger passwords and changing them regularly.”

2. Awareness

For Urquhart, companies should train employees to recognise cyber criminals’ tactics and understand how to avoid being tricked.

“Additionally, given that most ‘inside out’ data breaches are accidents, businesses need to teach employees how to manage sensitive information, stay up-to-date on threat intelligence reports, and be aware of the latest cyber-criminal exploits,” he adds.

3. Tools

Companies should implement a selection of tools that monitor streaming applications on the network to identify unusual behaviour or unknown network applications effectively.

“This can help prevent exploits from being discovered after it is too late to mitigate them,” Urquhart adds.

“Additionally, businesses should use testing solutions to make sure all programs are running as expected prior to deployment. This can ensure that data is kept where it is meant be kept, making it easier to protect.”

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securityIxia

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments