Security Leaks: Protecting on the Move

Data safety is a critical component of any successful organization. Whether you’re dealing with client information, proprietary technologies, or internal communications, it’s vital you take the necessary steps to ensure that your data is as secure as possible. When working to protect data, an organization must look at every possible avenue for a breach including internal security lapses, social engineering, lax safety standards, and more.

With so much to manage, it’s easy to let something slip through the cracks. One of the most common vulnerabilities we see at Kinetic is in organizations that overlook the enormous security risks generated when data is allowed to leave a secure facility via an employee’s laptop, email, or mobile device. No matter how secure your servers, your building, or your in-house PCs, off-site devices containing your organization’s data present an attractive weakness to would-be data thieves.

Proactive Education

The very first step in protecting data that leaves your facility is providing security education to your employees. Employees must realize that your data is at risk at all times. Work with an established IT security team to establish a basic list of security recommendations and require all employees to follow these guidelines. It cannot be stressed enough: Even with high-tier security solutions in your building, one laptop left in a coffee shop can completely compromise your entire customer network.

General guidelines often look something like this:

  • Never leave your laptop, tablet, or phone unattended in a public place.
  • Set your devices up so that they require a password to log in.
  • Do not share your work device with a friend or family member.
  • Bring your work device in for regular security checks, updates, and upgrades.
  • Treat your mobile device like your on-site work computer. Do not download unknown attachments, don’t click strange links, and stick to surfing work-related websites.
  • If your device goes missing or starts to act strange, alert the appropriate person within your organization immediately.

If your employees take the right steps to protect their devices, you can rest a little easier knowing your data is just that much more secure. Understand that the great majority of security leaks aren’t the result of sophisticated hackers breaking down an internal network, but the result of carelessness or a simple mistake by one individual who exposes an entire organization.

Regular Check-Ups

It’s often the case that internal IT departments seem to forget about company-issued hardware. If it’s not in the building, it’s not a concern. This is an excellent way to open up security holes in your network. Establish a security protocol for all work-related devices. When possible, devices should feature the same security protections featured by your on-site machines (anti-virus, anti-malware, anti-spyware, etc.). Devices should also have a required maintenance schedule in which they are regularly checked out by your IT experts (or a security firm) and updated to the latest security standards.

Remember: It only takes one accidental download on a take-home computer to crush a multi-million-dollar security network. The smallest actions can have immeasurable impact.

Moving Forward

Conduct a deep analysis of your current security standards (perhaps with a third-party audit) to get an idea of whether you’re weak on the subject of off-site hardware. In some cases, the safest option will be preventing data from ever leaving your facility. In others, reasonable accommodations can be made that protect your data as it travels with your employees.

It doesn’t necessarily matter what you decide, just that you approach this off-site security with the same seriousness you approach the security of your in-house hardware.