Apac
  • Home
  • CXO Insights
  • CIO Views
  • News
  • Conferences
  • Newsletter
  • Whitepapers
  • About us
Apac
  • Admired Tech

    Agile

    AI Healthcare

    Artificial Intelligence

    Augmented Reality

    Aviation

    Big Data

    Blockchain

    Cloud

    Cryptocurrency

    Cyber Security

    DevOps

    Digital Transformation

    Drone

    HPC

    Infrared

    Internet of Things

    IT Services

    Marine Tech

    Networking

    PropTech

    Remote Work

    Robotics

    Scheduling Software

    Sensor Tech

    Simulation

    Smart City

    Software Testing

    Startup

    Storage

    Unified Communication

    Web Development

    Wireless

  • Automotive

    Banking

    Capital Market

    Construction

    E-Commerce

    Education

    FinTech

    Food and Beverages

    Gov and Public

    Healthcare

    Insurance

    Legal

    Logistics

    Manufacturing

    Media and Entertainment

    Metals and Mining

    Pharma and Life Science

    Retail

    Sports

    Travel and Hospitality

  • CISCO

    Google

    IBM

    Microsoft

    Oracle

    Salesforce

    SAP

    ServiceNow

  • Business Intelligence

    CEM

    Cloud-based Planning

    Cognitive

    Collaboration

    Compliance

    Contact Center

    Contact Tracing

    Contactless Payments

    Corporate Finance

    CRM

    Custom Software Development

    Data Center

    Digital Signage

    Enterprise Architecture

    Enterprise Asset Management

    Enterprise Communications

    Enterprise Contract Management

    Enterprise Performance Management

    ERP

    Facility Management

    Field Service

    Fleet Management

    Gamification

    HR Technology

    IT Infrastructure

    IT Service Management

    Managed Services

    PLM

    Procurement

    Product Management

    Project Management

    RegTech

    Revenue Management

    Sales Tech

Menu
    • Plastic Tech
    • CISCO
    • Collaboration
    • Compliance
    • Contact Center
    • Healthcare
    • IT Service Management
    • Microsoft
    • Retail
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Plastic Tech
    Editor's Pick (1 - 4 of 8)
    left
    IT is Indispensable for Business Optimization

    Dhiren Savla, Chief Information Officer, VFS Global

    Plastics - A Green & Smart Future

    Arturo Valencia, Director of Research & Development, Dura-Line Corporation

    Rethinking Manufacturing with the Digital Factory

    Menno Ellis, Senior Vice President & General Manager, Plastics, 3D Systems

    Disruption looms: The rise of the business app ecosystem

    Vaughan Rowsell, Founder and CEO, Vend

    Big data and Analytics - the Revenue boosters

    Sheen Chungath

    A CIO's Guide to Investing in a Data Strategy

    Srikant Gokulnatha,

    2015: The Year of Reckoning for BYOD

    Ojas Rege, VP Strategy, MobileIron

    BYOD Policies: Securing Corporate Data in Today's Mobile World

    Brian Reed, CMO, Good Technology

    right

    Forget the Data Center, Endpoint Security is the New Security Hotspot

    By Mitch Coopet, Co-Founder & Chief Technology Officer

    Tweet
    content-image

    Mitch Coopet, Co-Founder & Chief Technology Officer

    Every week, whether it makes the news or not, companies suffer the consequences of an incomplete data security strategy. Just last week, health insurance provider Premera Blue Cross disclosed that attackers used phishing emails and fake websites to gain access to logins and passwords of employees, potentially exposing medical and financial information of 11 million customers. Credential theft is one of the most serious security threats affecting companies worldwide and in all industries, and it happens all the time.

    “CIOs must make sure that whichever cloud deployment they choose is adopted in compliance with the enterprise’s needs and policies” 

    Check this out: Top Endpoint Security Technology Companies

    Historically, corporate data was stored in servers and data centers on-premises, protected behind firewalls and other digital barriers. Today, the workplace is driven by data and that data moves with employees, wherever they may work, on whatever device they may use. The notion of protecting sensitive work data by keeping intruders out of a corporate perimeter is antiquated.

    Corporations need to rethink their security programs so they protect against newer, more sophisticated attacks that don’t just target one gateway into the network, but can sneak in through multiple ways. A complete data strategy embraces data as it moves with your employees  on all the devices employees touch and in the cloud. Here are four suggestions for CIOs and CISOs to ensure that corporate data is secure where it lands most often the endpoints:

    1. Define a Cloud Data Classification Strategy in Your Acceptable Use Policy

    Take the time to define policies stating what is acceptable in terms of data consumption and storage. Do you allow cloud services? If so, which ones? What data can be stored there without violating regulations or compliance?

    Classifying the data allows IT managers to determine the risk and security level that each type of data should follow.

    For example, you may have “red” data, or “mission critical” information, that stays on-premises for maximum security, whereas “green,” or “productivity” data,may be stored in a public cloud service, if it meets the organization’s security requirements.

    When managing red and green data, a hybrid cloud  which balances convenience and security may be the right choice for your enterprise as it provides on-premises protection for particularly sensitive data. CIOs must make sure that whichever cloud deployment they choose is adopted in compliance with the enterprise’s needs and policies.

    2. Encrypt File Systems

    Given that theft of login credentials is the most common avenue attackers have into corporate systems, encrypting end­point device file systems is where security should start. More than three in five data breach vic­tims pinpoint credential theft as the cause of breaches, with the most recent and notable victim being Anthem. Furthermore, con­sider requiring the use of encrypted USB keys as part of your sanctioned media storage policy. Finally, make sure your backup systems support suitable encryp­tion models for your organization.

    3. Gain Visibility into the Data that Resides on Endpoints

    When an employee loses a device or leaves the company, the IT team needs to know what data was on the device. However, few CIOs and CISOs have this visibility: only 19 percent of IT pros know how much regulated data is on endpoint devices. This is particularly important as more and more employees connect their work accounts to personal cloud accounts, such as Google Drive and Dropbox, which increases the risk of data leakage both intentional and accidental. Continuous endpoint backup not only protects you from data loss but also helps in determining the source of the data leak or breach.

    4. Empower Employees to Follow Acceptable use Policy

    It’s the CIO’s job to make sure the enterprise is set up for success and that includes setting policies that don’t deny employees to use tools that they want to use, but enable them to do so while preserving data security and privacy. Too often employees use their own version of an app, or their personal accounts, which open up the corporate network to malware and attacks if the personal account or device is compromised. The reality is 90 percent of American employees use their smart phones for work, with or without the company’s permission. If employees reject the tools introduced by their IT team, the enterprise has not only wasted money, but may have also a false belief that data is secure. CIOs can get employee buy-in for policies by choosing elegant, user-friendly technology and making the policy as restriction-free as possible while maintaining security visibility.

    As technology and workplace habits evolve, enterprises need to adapt to the notion that corporate data security is a moving target. When CIOs and CISOs were asked a decade ago how they addressed the intersection of security, cloud and mobility, they said, “We’re not going to allow cloud services or BYOD.” Today that just isn’t feasible, or smart. Forward-thinking executives realize that for security to work you have to follow the data. Today, the data is in the cloud and the endpoint, not just the data center.

    See More: Top Plastic Tech Consulting Companies
    tag

    Data Security

    Financial

    ENDPOINT SECURITY

    Weekly Brief

    loading
    Top 10 Plastic Tech Solution Companies - 2019
    Top 10 Plastic Tech Consulting/Services Companies 2019

    Featured Vendors

    SDI Plastics

    Kulbir Dhanda, Director

    ON THE DECK

    Content Management System 2020

    Top Vendors

    Contactless Payments 2020

    Top Vendors

    Admired Tech 2020

    Top Vendors

    Corporate Finance 2020

    Top Vendors

    AI 2020

    Top Vendors

    Travel and Hospitality 2020

    Top Vendors

    Startup 2020

    Top Vendors

    Networking 2020

    Top Vendors

    FinTech 2020

    Top Vendors

    CRM 2020

    Top Vendors

    Scheduling Software 2020

    Top Vendors

    Education 2020

    Top Vendors

    Business Intelligence 2020

    Top Vendors

    PropTech 2020

    Top Vendors

    Salesforce 2020

    Top Vendors

    Big Data 2020

    Top Vendors

    Simulation 2020

    Top Vendors

    Product Management 2020

    Top Vendors

    Legal 2020

    Top Vendors

    Remote Work 2020

    Top Vendors

    Cryptocurrency 2020

    Top Vendors

    CEM 2020

    Top Vendors

    Insurance 2020

    Top Vendors

    Data Center 2020

    Top Vendors

    Banking 2020

    Top Vendors

    RegTech 2020

    Top Vendors

    Wireless 2020

    Top Vendors

    Procurement 2020

    Top Vendors

    Cognitive 2020

    Top Vendors

    Drone 2020

    Top Vendors

    HR Technology 2020

    Top Vendors

    HPC 2020

    Top Vendors

    Pharma and Life Science 2020

    Top Vendors

    SAP 2020

    Top Vendors

    Food and Beverages 2020

    Top Vendors

    Cloud 2020

    Top Vendors

    Blockchain 2020

    Top Vendors

    Cloud 2020

    Top Vendors

    Logistics 2020

    Top Vendors

    Augmented Reality 2020

    Top Vendors

    Contact Center 2020

    Top Vendors

    Oracle 2020

    Top Vendors

    Cyber Security 2020

    Top Vendors

    E-Commerce 2020

    Top Vendors

    Compliance 2020

    Top Vendors

    Enterprise Architecture 2020

    Top Vendors

    Digital Transformation 2020

    Top Vendors

    Manufacturing 2020

    Top Vendors

    Agile 2020

    Top Vendors

    CISCO 2020

    Top Vendors

    Field Service 2020

    Top Vendors

    Contact Center 2020

    Top Vendors

    IoT 2020

    Top Vendors

    Microsoft 2020

    Top Vendors

    Retail 2020

    Top Vendors

    Aviation 2020

    Top Vendors

    Healthcare 2020

    Top Vendors

    IT Service Management 2020

    Top Vendors

    Top Vendors

    Big Data 2019

    Top Vendors

    Digital Signage 2019

    Top Vendors

    Sales Tech 2019

    Top Vendors

    Startup 2019

    Top Vendors

    Salesforce 2019

    Top Vendors

    AI 2019

    Top Vendors

    Google 2019

    Top Vendors

    Smart City 2019

    Top Vendors

    FinTech 2019

    Top Vendors

    Admired Tech 2019

    Top Vendors

    Big Data 2019

    Top Vendors

    IT Services 2019

    Top Vendors

    Business Intelligence 2019

    Top Vendors

    Education 2019

    Top Vendors

    Project Management 2019

    Top Vendors

    Enterprise Asset Management 2019

    Top Vendors

    CRM 2019

    Top Vendors

    Data Center 2019

    Top Vendors

    PropTech 2019

    Top Vendors

    Capital Market 2019

    Top Vendors

    Travel and Hospitality 2019

    Top Vendors

    Legal 2019

    Top Vendors

    IT Infrastructure 2019

    Top Vendors

    Plastic Tech 2019

    Top Vendors

    Facility Management 2019

    Top Vendors

    Fleet Management 2019

    Top Vendors

    CEM 2019

    Top Vendors

    Sensor Tech 2019

    Top Vendors

    RegTech 2019

    Top Vendors

    Marine Tech 2019

    Top Vendors

    Collaboration 2019

    Top Vendors

    Software Testing 2019

    Top Vendors

    Facility Management 2019

    Top Vendors

    Automotive 2019

    Top Vendors

    Food and Beverages 2019

    Top Vendors

    Insurance 2019

    Top Vendors

    HPC 2019

    Top Vendors

    Wireless 2019

    Top Vendors

    Simulation 2019

    Top Vendors

    Corporate Finance 2019

    Top Vendors

    Drone 2019

    Top Vendors

    AI Healthcare 2019

    Top Vendors

    SAP 2019

    Top Vendors

    Procurement 2019

    Top Vendors

    Cyber Security 2019

    Top Vendors

    IBM 2019

    Top Vendors

    Construction 2019

    Top Vendors

    Logistics 2019

    Top Vendors

    Managed Services 2019

    Top Vendors

    Manufacturing 2019

    Top Vendors

    Media and Entertainment 2019

    Top Vendors

    Cloud 2019

    Top Vendors

    Banking 2019

    Top Vendors

    Agile 2019

    Top Vendors

    IT Service Management 2019

    Top Vendors

    Retail 2019

    Top Vendors

    HR Technology 2019

    Top Vendors

    Oracle 2019

    Top Vendors

    Cognitive 2019

    Top Vendors

    Compliance 2019

    Top Vendors

    Contact Center 2019

    Top Vendors

    Healthcare 2019

    Top Vendors

    Gov and Public 2019

    Top Vendors

    Microsoft 2019

    Top Vendors

    Pharma and Life Science 2019

    Top Vendors

    DevOps 2019

    Top Vendors

    E-Commerce 2019

    Top Vendors

    Blockchain 2019

    Top Vendors

    IoT 2019

    Top Vendors

    Metals and Mining 2019

    Top Vendors

    Gamification 2019

    Top Vendors

    Field Service 2019

    Top Vendors

    Augmented Reality 2019

    Top Vendors

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Accelerating Petcare Innovation through CRM and Digital Vision

    Accelerating Petcare Innovation through CRM and Digital Vision

    Miao Song, Chief Information Officer, Mars Petcare
    How Cloud Systems are Impacting Business Environments

    How Cloud Systems are Impacting Business Environments

    Martin Stegner, CIO, NOVUM Hospitality
    Digital Tack

    Digital Tack

    Claus Nehmzow, Chief Innovation Officer, Eastern Pacific Shipping Pte
    Brokering the Cloud Services

    Brokering the Cloud Services

    Eric Boyette, Secretary & State CIO, Information Technology
    Defining a Cloud Strategy: A Higher Education Paradigm

    Defining a Cloud Strategy: A Higher Education Paradigm

    Russell M. Kaurloto, VP and CIO, Clemson University
    The 4Ps of Digital Transformation in Pharmaceutical Industry

    The 4Ps of Digital Transformation in Pharmaceutical Industry

    Debraj Dasgupta, Operating Officer, Head of Strategy and Go-To-Market Planning Division, Nippon Boehringer Ingelheim
    Technology’s Role in The Care and Quality of Life for The Aged

    Technology’s Role in The Care and Quality of Life for The Aged

    Jose A Perez, Chief Information Officer, Hammondcare
    How ECM is Revolutionizing Organizations

    How ECM is Revolutionizing Organizations

    Thomas Phelps IV, VP of Corporate Strategy & CIO, Laserfiche
    Loading...

    Copyright © 2021 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy  |  Sitemap |  Subscribe

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://plastic-tech.apacciooutlook.com/ciospeaks/forget-the-data-center-endpoint-security-is-the-new-security-hotspot-nwid-245.html