Do you work in an organisation that stores confidential data and uses personally identifiable information and financial data to operate? Your answer should be yes – as that is how most businesses operate in today’s landscape of enterprise security.

All businesses today operate with various amounts of data. Sometimes it is massive amounts stored, usually information on customers, business partners, suppliers, and other parties. With growing levels of sensitive third-party information data, there is an increase in interest from hackers and scammers looking to gain access.

News Insights

If you look at the news regularly, you will be no stranger to hearing of the latest cyber attacks on vulnerable businesses and their employees. They are growing in frequency as much as in complexity, and anybody within that organisation is deemed vulnerable to unforeseen risks.

Every type of industry views cyber threats as a significant concern of the 21st century, and enterprise cybersecurity needs to be company-wide with support and training for all data-accessing employees. It is heightened when employees with data access operate from remote working patterns. If a personal device is used to access organisation networks, you have to ask whether the security features on these devices are fully protective of all parties.

Protection on Lost Devices

If these devices are stolen or lost, how secure is the company data from those who can unlock the phone? Smartphones have plenty of features that can help identify the location of a mobile device, such as location sharing and find my device settings.

Many employees may not use applications such as facial recognition or biometrics to access their devices, relying on risky measures such as PINs and passwords that are their birthdates. Many also use personalised passwords for every account that requires a password login, simply out of ease in remembering them.

These are dangerously outdated ways of security that every business needs to address with staff with data access. Whilst corporations need to address this, so does any employee who shares a device for personal and business use.

High-Level Safety Settings

If a device has all of the apps and protections to ensure high-level safety, they don’t do any good if the person who owns the device does not activate them and abide by them. Many employees fail to activate the ‘find my device’ application that would help retrieve the device. Many also do not use the facial recognition or fingerprint unlock capability that secures their devices.

It is a behaviour pattern with trusted employees that needs to be implemented as part of an enterprise security plan of any corporation and addressed at any enterprise security and risk management conference.

Emergency Apps

For those employees who use smartphones, how many know about the implemented security options that not only protect their data but also protect their well-being? Many owners of these devices fail to activate location sharing with trusted contacts whenever they go on long journeys or hikes where they can potentially go missing or have an accident.

Other devices, such as the Samsung Galaxy phones, are equipped with settings that can send SOS messages to emergency contacts should anything happen – but they require effort in setting them up and alerting the parties that you have done it, so they know what the messages mean.

Are you interested in learning more about enterprise security and enterprise data security? Are these areas you want to see discussed at a risk management conference London? For more information on future developments in these areas, look for these upcoming events in enterprise cybersecurity.

Shares: