By Rajiv Bhalla, Barco India
Here is a creative account of penetration-testing a cyber-security firm did on one of the world's largest banks and what it tells us about internet safety.
Here is a creative account of penetration-testing a cyber-security firm did on one of the world’s largest banks and what it tells us about internet safety.

-related meeting stress causes serious problems throughout the workplace, from lowered productivity to lost business and even missed promotions.

As per a Barco research, 9 in 10 office workers experience seriously elevated stress levels when dealing with troublesome technology during meetings. People’s heart rates reached 179bpm when struggling with technology during a meeting, compared to resting heart rates of around 60-100 bpm – a clear indicator of stress.

Therefore, we all want a meeting room, where people are not struggling with wires and plugs but sharing their screens and presentations with just a click of a button.

Businesses in the modern age are looking at providing the millennial workforce with cutting edge technology and solutions to share information seamlessly and securely. Furthermore, these solutions are also made available across devices. Therefore, it is inevitable to change the rule for security, as we know and implement it today.

Every organization, irrespective of and scale, is investing heavily to assess and mine data. As a result data security has become extremely important and critical as it is today. According to Risk Based Security’s2017 Data Breach QuickView Report, there were 5,207 breaches recorded last year.

The number of records compromised also surpassed all other years, with over 7.8 billion records exposed, a 24.2% increase over 2016’s previous high of 6.3 billion. Security is no longer a tick in the box, but a business imperative, an issue that has a direct impact on the balance sheet of an organization. While traditional security systems still exist, today’s AI and data-overloaded world needs new and modern measures.

For example, your keyboard can give away sensitive data, or the wires you use in a meeting room can be compromised. Today, collaboration is on the rise, as sharing of information inside and across offices is key to business growth. However, this also increases the canvas for a cybercriminal. While
organizations have started to realize the business of cyber world, they are yet to realize threats caused by processes. Today with the availability of technology, cybercriminals can infiltrate and access information in collaboration through application programming interfaces (APIs)
or through accidental authorizations that leak private information outside of an organization.

Rise of wireless collaboration

To solve the meeting room woes and bring in more secure form of collaboration, wireless collaboration has seen a steady growth trajectory in the past few years. But it too comes with its own set of security challenges. Wireless collaboration solutions should only allow original manufacturer software to run on the device, it prevents malware from invading. Secondly, having a layered approach to ensure information security is critical. This allows another security measure to automatically step in if one safeguard fails.

Wireless collaboration solutions should give the IT manager flexibility to choose and deploy the right security measure, right authentication and access levels to various processes – you decide, defend and defeat.

Secure your wireless collaboration solutions

One of the major imperatives while using wireless collaboration solutions is to have a secure Wi-Fi infrastructure. The right choice of frequencies and channels in large-scale Wi-Fi deployments requires detailed knowledge of radio frequency (RF) and Wi-Fi technology along with appropriate tools such as spectrum analysers.

The 2.4-GHz frequency band is usually very crowded. So, you must use a product which has a 5-GHz capability. To select an appropriate channel within the chosen frequency you should use a Wi-Fi channel visualization tool such as the freely available InSSIDer tool from MetaGeek. This tool will show you which channels are already occupied and which are free.

Choose a channel that is still free, or that contains only weak signals from other access points (APs). Conduct regular checks in environments where frequent changes occur in Wi-Fi and other RF equipment. The cornerstone principle of information security is the CIA triad: confidentiality, integrity, and availability. All parts of a product or system must honour this concept throughout the system’s lifecycle to guarantee a secure environment.

Surprisingly though, only 34% of companies today take the time to do thorough assessments on interconnectivity and vulnerability when introducing new technology in their company (The Global State of Information Security Survey 2018 by Pricewaterhouse Coopers – PwC). However, 28% have
already experienced loss or damage of internal records due to security incidents.

Choosing safe technology can help companies build resilience to sustain operations and boost economic performance when being faced with cybercrimes. While India gears up to be at the forefront in the global digital roadmap, we must ensure to look at the side of digital – SECURITY – very carefully. Both businesses and individuals need to have a security first approach rather than looking at it as an IT expense. In today’s ever-changing world of technology, we shouldn’t allow security to be a roadblock to our .

(The author is the Managing Director, Barco India. Views expressed above are his own)



Source link
thanks you RSS link
( https://tech.economictimes.indiatimes.com//technology/collaboration-the-next-cyber-threat/65069305?utm_source=RSS;utm_medium=ETRSS)

LEAVE A REPLY

Please enter your comment!
Please enter your name here