subscribe: Daily Newsletter

 

Plug the holes in company networks

0 comments
Employees are not supposed to be security risks for a company, but in many cases inadvertently provide cyber-criminals with access to the company network. Modern business requires that data is easily accessible, and with the increasingly mobile nature of business, USB sticks have become a standard part of the cyber briefcase.
However, while USB sticks are a handy storage medium, they can also provide an open door to internal company data.
“Do you know which hidden programs are running on a USB stick handed to you by a customer or business partner?” asks Lutz Blaeser, MD of Intact Security. “USB sticks can carry Trojans and keyloggers, putting your entire company network at risk. Similarly, social networks provide a multitude of risks, from phishing to malware.”
The solution, he says, is endpoint protection. This is a modern security concept for company IT that strikes an acceptable balance between protecting data and interfering as little as possible with people’s work. “Intelligent security solutions must be able to make distinctions: for example, the company’s marketing department must of course have access to social networks, to make sure the employer has a presence there. However, the accounts clerks should not be wasting time on Facebook.
“Employees who work from home must also be able to edit documents on their computers at work via a USB stick. However, at the same time, it must be ensured that a user cannot copy the employer’s database at the click of a mouse.”
While there is now a range of security products designed to tackle this issue, they are often cumbersome even for administrators to use, because they are so complex to manage. And, Blaeser points out, the more complex the administration of a product, the more likely it is that a vulnerability will be missed.
“With Endpoint Protection, experienced antivirus provider G Data offers a comprehensive all-in-one solution for companies that not only provides anti-virus software, a firewall and an anti-spam module, but also facilitates comprehensive policy management. It also defines who may install which programs – even from a specific version number.
“For example, a typist will hardly need to update office software. A research employee, on the other hand, must always have the latest versions of his or her programs. In addition, he or she must be able to test new software – which may make work easier in the future,” explains Blaeser.
G Data’s Endpoint protection is an all-in-one security solution for small, medium and large corporate networks. With performance-optimised protection against malware threats for laptops, desktops, and servers, this solution also provides a content filter for ensuring the corporate policy is correctly implemented in the work place, in addition to its many other features.
“G Data Endpoint Protection combines client/server-based, best-in-test virus protection with an award winning client firewall and effective, productivity-increasing client settings. It provides optimum protection against hacker attacks, viruses and spam as well as legal security in respect of the use of corporate PCs,” Blaeser concludes.