Communicating with Confidence: Choosing a Secure, Flexible Working Solution
by Stephen Lewis - VP of Product Management at AEP Networks - Friday, 3 March 2006.
In today’s mobile, highly-networked world, workers depend on access to their office networks to retrieve data about their customers, colleagues and business projects. Whether they are salespeople on the road, organisations collaborating on projects or government departments accessing multi-source data, most professionals in today’s workforce share information over the Internet via their office networks.

Along with the benefits of networked systems – easy information sharing and the ability to work wherever and whenever – comes responsibility. Professionals in all industries have the responsibility to protect their customers’ (and their own) confidentiality. When professionals access their office networks and exchange information with other organisations, confidentiality is paramount, though not always easy to achieve.

The good news is that sharing information, central services and applications is becoming easier and less expensive for organisations to implement. On the other hand, not all run-of-the-mill networking solutions protect confidentiality as well as they should. In these early days of network communication, companies can become too focused on features and functionality and overlook key security functions. Although the capability to exchange information between agencies and organisations is critical, the security systems and standards involved vary considerably and may permit hackers, insiders and even criminal organisations to access your private data.

Security can be achieved more easily when employees access company networks from a secondary office or from company-issued computers. But that’s rarely the norm. Increasingly, workers use equipment that doesn’t belong to them, such as computers in Internet cafes, airport terminals and customer and business partners’ offices. Even when workers use office-issued computers, it’s vital that sensitive information is protected in the event that their PDAs, PocketPCs or laptops are lost or stolen. In this case, it’s critical that the authenticity of the user is validated before information is released, and that the confidentiality and integrity of data is assured in transit. In allowing users to access sensitive data, communication routes must not open up other vulnerabilities.

So, what are the primary considerations for choosing the most suitable and effective network solution for your business?

Independent verification is key. To achieve an independent assurance ranking, manufacturers must subject their products to evaluation by an external body. A third-party independent assurance group evaluates the performance and quality of a product. They determine if the security mechanisms and functions achieve confidentiality and fulfil compliance regulations. Examples of trustworthy independent assurance vendors include Communications Electronics Security Group (CESG) in the United Kingdom and the US National Institute of Standards and Technology (NIST) in the United States.

Experience counts. When evaluating network products, consider whether the manufacturer has experience protecting sensitive information. Do they understand the security policies and procedures that the end-user community must meet? Will they provide pre and post sales support necessary to roll out and maintain a mission critical system? Do they have happy customers who are willing to provide references?

Industry knowledge can make a difference. While most network access solutions can be implemented for any business, you may benefit from working with a company that understands your industry, particularly if you deal with highly sensitive data. For example, security requirements in the financial sector, healthcare and the public sector are often more stringent than in other industries. Ask if the manufacturer has experience developing products for your industry. Do they have customers within you industry area that you can talk to about their products?

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //