How to Stay Secure in the Hacking Age

We’ve seen hack after hack in headline news recently. Even businesses that sell themselves on guaranteeing your security are getting hacked – case in point, the affair dating website Ashley Madison’s hack and release of thousands of personally identifiable user information. Then there’s JP Morgan and Target, and any number of smaller businesses daily. Hackers are hitting small businesses exceptionally hard, believing that their security is likely lacking. But not to fear, we and our partners are on top of it, constantly patching the holes and preventing new ones from appearing.

  1. Better Email. Dell SonicWall impressed us with new security features, specifically for email. Chris Gallup of Dell Channel SE told us they’ve added more end-user checks and endpoint control, so that businesses can rest assured that the integrity of their security is not solely up to employees not falling victim to scams. As scams are getting more advanced, Dell’s been enhancing security to identify them. The latest trend in scamming is fake Failed Delivery notifications. To combat this, we’re seeing applications with better flagging systems and detailed analyses of messages, and ratings. Alternatively, email security is getting smart enough to identify what used to be marked as spam, but may actually be of high importance – for example, bomb threats and the like should not be living in a junk folder.
  1. Containerization. A buzzword in the BYOD (Bring Your Own Device) landscape, containerization is also the name of the game. Keeping work and personal separate on devices (a major change in Windows 10, according to Dell) is a priority. Considering this, the device becomes less of a concern, and the apps it runs come more into scrutiny. Really, BYOD is an opportunity for more integrated and productive work. It’s BYOA – Bring Your Own App – that business’s need to be wary of. It should be the IT department’s main priority to monitor which apps employees are using, and making sure they’ve approved them, or, making sure all employees are using apps that are pre-approved by IT. Vendors like Dell are becoming more aware of this, and allowing Firewalls that can selectively filter down by app. Controlling the app, and even controlling by user can be extremely beneficial. For example, if the marketing department needs Facebook, they can have access – but the finance department might only be able to access Facebook as read only.
  1. Encryption. More and more data is being encrypted these days, and even then that sometimes can lack the level of security that’s necessary. Any organization sending and receiving emails with personally identifiable information should be encrypting their emails. Dell’s new TZ series of devices, including TZ400 802.11n has decrypting technology, simultaneously encrypting and decrypting data, including emails, to maintain security and stability, which still growing bandwidth speeds.

No one is immune to a hack, not even the Pentagon. Security can’t be left wholly in the hands of employees. As phishing gets smarter, IT operations need to be more agile and more sophisticated than ever. Getting in front of the problems, and reacting swiftly when they do happen, is the only way to be secure.

About the Author