In case you missed it, NetMotion by Absolute’s wine tasting session centred discussions around cyber security this month. Attendees from the legal IT community from over 50 firms across the US learned about NetMotion by Absolute’s solutions, visited the beautiful Durigutti Winery in Argentina, and Courtney Liptrot from SecureIT360 led a “fireside chat” about cyber resilience.
What is cyber resilience? And what does it mean to legal IT professionals?
In a nutshell, cyber resilience refers to a company’s ability to mitigate damage (damage to systems, processes and reputation) and the ability to carry on once these systems have been compromised. Cyber resilience covers adversarial attacks (hackers, bad actors) and simple human error. For example, in 2021 alone, there were at least six notable ransomware attacks, ranging from the Harris Federation attack in the UK to the Colonial Pipeline cyberattack in the US. We often hear our clients say, “it’s not if an attack will happen; it’s when”.
The importance of security and visibility at the endpoint
A post-pandemic workplace will rely heavily on remote devices to stay connected and productive. Work from home quickly became work from anywhere and a required job benefit in some instances. As more people jump on the opportunity to work from home (or anywhere), businesses and organizations are forced to reconsider device security.
While there are benefits to allowing employees to work remotely, there is always the concern that they could misuse devices. Since these devices often have sensitive data stored directly on them or have access to sensitive data, it’s essential to maintain control over whose hands they fall into and what to do in the event they do.
This seems like an impossible task until you discover ‘resilient zero trust’. Resilient zero trust refers to the ability for NetMotion by Absolute to not only persist and heal applications but provide the secure, unbreakable tunnel to the endpoint that houses those applications, all while ensuring each endpoint meets the requirements to access those critical applications. What this means is firms can offer that flexible work policy, all while ensuring your fee earner can work safely and productively. Since the software is factory-embedded, it is almost impossible for ill-intentioned persons to remove it. This is arguably one of the most effective ways to enhance device security and protect your investments and valuable information.
According to a poll conducted during the webinar, attendees shared the following feedback on the questions below.
- What are the important factors in creating an effective policy to improve cyber-resilience?
- What barriers do firms face when managing risk?
- What is the impact of an effective cyber resilience policy?
Raising awareness of the threats and impact of cyber risk followed by improvements to cyber security were the two factors attendees cited as the most important to an effective security policy. While most attendees felt their firms were not lacking in talent to create such a procedure, the most common barrier cited when managing risk was the complexity of the environment. And for all the factors involved in creating an effective approach, the most important by far was foundations, guidance, sharing information and setting security policy standards.
If firms allow some or all your employees to work from home full-time or part-time, it adds another layer of concern to the overall security level of devices and sensitive data. Firms don’t know if their employees may misplace or misuse their devices. There is also the concern that company devices may end up in the wrong hands through theft. To maintain optimal levels of security, IT professionals need to incorporate infrastructure and resources that can support remote work while allowing secure remote access to information and systems.
Request an endpoint security demo
If you aren’t clear on how NetMotion by Absolute technology can help you in an effective security policy, we’d love to show you a demo and reveal in detail how you can maintain complete control and visibility of each device while having the option of freezing or wiping any device at any time. Sign up for a demo now to learn more.
- Ransomware – the scourge of our times
- Creating a Cyber Security Culture with former Arsenal F.C IT Director, Christelle Heikkila
- Demand for ZTNA continues its upward trajectory in 2022
- What does “cyber resilience” mean to Legal IT?
- Where are you on the machine learning and artificial intelligence roadmap?