Home Business IT Security Data leakage the top security threat

Information security consultancy Pure Hacking reckons Australian organisations are underestimating the risk of data leakage when employees connect personal devices to corporate networks.

"Corporate data leakage from internal sources is the single major security factor affecting Australian organisations today," said Ty Miller, CTO, Pure Hacking. "This is because IT and management teams have underestimated the issues that arise when you connect more personal devices to the network and allow these personal devices to travel without restriction. This all contributes to a modern form of internal corporate espionage."

But Mr Miller and his colleagues failed to offer any general advice about how organisations can minimise or mitigate such issues.

A recent survey conducted on behalf of Citrix found security was the number one issue around the use of employee-owned devices for business purposes.

Other problems highlighted by Pure Hacking included industrial espionage with commercial or criminal motivation, a resurgence of wireless attacks thanks to the lack of support for more complex authentication mechanisms on mobile devices, SMS-based phishing, attacks on lost or stolen devices even if they are encrypted, and complex attacks following in the footsteps of Aurora.

Mr Miller also suggested organisations should ensure their suppliers and service providers really do comply with relevant standards such as PCI DSS rather than taking their claims at face value.

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.

Connect