This week's user-submitted question: "My company has made anti-virus software mandatory on all machines, including my home machine since I access email on it. How does this software work, and will it impact my machine? Why is it necessary when there are built-in tools?"
The 2018 Telstra Security Report uses data from more than 1,250 decision-makers globally to present a view into the most prevalent and pervasive types of security threat and recommend ways to combat them.
Most organizations are having a tough time striking a balance between maintaining the strong security they require and giving employees the freedom and flexibility they need to excel at their jobs. For example, allowing users to log in from their mobile devices ensures they can work from anywhere — but opens more doors to the corporate network that attackers could exploit. Conversely, requiring complex passwords and two-factor authentication for every log-on strengthens security — but frustrates users and disrupts critical business workflows.
Each year, the RSA Conference brings together top information security experts to discuss critical cybersecurity issues. I hope you got the chance to attend! I found it both fun and enlightening, and I wanted to share my top four takeaways with you.
1. Cybersecurity remains a critical concern for organizations worldwide.
Last week, we discussed the potential problems businesses run into when it comes to identity sprawl. Now, this idea is not limited to just identities, but also the many devices each individual user has and could potentially bring on your network.
The European General Data Protection Regulation (GDPR) will take effect on May 18, 2018. The GDPR requires businesses to comply with new rules for collecting, sharing, and protecting personal data within the borders of the European Union (EU) or when exporting information internationally. This applies to any organization that processes personal data of EU citizens, regardless of where that business is located. All companies that do business in Europe will be required to implement a range of security measures.