Tait CIO John Emerson discusses why security of information is such a concern, and where to start to make a difference.
Security is as much of a concern for shareholders as regulators. Ultimately though, it doesn’t matter how a hacker gets in. Once they are inside, the damage could be substantial. One large Australian company lost 20% of its market value within three days of a security breach being disclosed. However, there are some key areas to focus on, to reduce the likelihood of this occurring.
Include work and personal devices, particularly if they operate on public networks, including TCP/IP.
Background check staff and ensure they participate in the development (or upgrade) of your security policy.
Include base stations, devices and software.
Local area, wide area and the cloud; If these appear secure, pay an accredited organization to try and break in to test it.
Ensure they have ISO 27001 certification.
Policy AND processes should be in place to protect and secure private data and applications.
This creates new opportunities for hackers even on a work device at home. Ensure this is covered in the security policy.
Often overlooked, ensure processes around access logs, swipe cards etc are stringent.
When considering new applications for purchase, ensure they are secure.
This article is taken from Connection Magazine, Edition 4. Connection is a collection of educational and thought-leading articles focusing on critical communications, wireless and radio technology.