Page 57 - Security Today, September 2018
P. 57

not been put at risk. The most popular way for these organiza- tions to privately share sensitive data is to use end-to-end encryp- tion (E2EE). E2EE protects data in transit by encrypting it to make the content unintelligible.
Therefore, only the sender and the legitimate recipient of the message possess the unique keys to unlock the information. Even if a third-party were able to eavesdrop on the network communi- cation, the information itself would be indecipherable.
The introduction of new compliance standards, like General Data Protection Regulation (GDPR) in Europe, is driving the need for businesses of all industries and sizes to embrace E2EE for their communications. It’s an approach that ensures mobile communications stays private and dramatically reduces the risk of a data breach.
Advanced Authentication
One of the strongest mobile device authentication technologies available today is biometric mobile authentication. As biometric authentication methods and technologies are based on a physi- cal characteristic of the user, they are extremely difficult for an attacker to copy. Forms of biometric authentication include fin- gerprint authentication, voice recognition, facial recognition and retinal scanning. Companies should advise employees to imple- ment biometric authentication on each and every device that will access the corporate network as it provides an extra layer of pro-
tection and prevents unauthorized users from using devices. Businesses are adjusting their security posture to bring it into line with the modern way of working. It’s no longer a question of managing employee access based on where they sit, it’s more im- portant these days to be able to authenticate them automatically
based on the device and the software they are using.
While connecting digital devices to corporate networks during business trips has become an accepted part of everyday working life, the number of ways in which sensitive company information could be lost or stolen while traveling is growing. The most secure path is to provide employees with a company-managed profes- sional remote access VPN that automatically encrypts data com- munications and shields web browsing activity and IP informa-
tion from hackers.
A professional VPN automatically opens up an end-to-end
encrypted tunnel between mobile device and company network that maintains the integrity of all data communications—keeping it private and secure. Implementing strong passwords, antivirus software and spam filters will also prevent many unnecessary in- cidents. By implementing these security strategies, employees will be able to effectively fly under the radar wherever their business travels take them.
Julian Weinberger is the director of systems engineering at NCP Engineering.
Make us your homepage!
Our website uses responsive design to adapt to whatever device you’re using.
• Breaking news
• Relevant industry news and trends
• The newest security products
• Online product database and directory
• Trending topic and product videos
• Training through Security Today Academy
1.5988 in
Go to sp.hotims.com and enter 207 for product information. securitytoday.com NS9


































































































   55   56   57   58   59