Enterprise Mobility Solutions and BYOD: Questions to Ask

Bring your own device (BYOD) a key element of Enterprise Mobility Solutions allows your employees to use their personal devices for company applications. This may include email, CRM and document sharing systems. This benefits the enterprise due to cost savings on hardware and benefits employees as one device fulfills multiple use cases.

Historically allowing third party devices onto a corporate network has been a strict no-go for traditional IT departments. But with the migration to BYOD and Enterprise Mobility Solutions new security and access policies are required.

Recently noted security expert David Strom posted on Tech Target the 6 questions to ask before implementing a BYOD policy.

The “Six Questions To Ask Security Providers” from Tech Target

  1. Is all traffic encrypted between mobile devices and your corporate network? Some security apps use SSL connections, and some provide their own encryption methods. Other tools don’t encrypt any data that is sent over the Internet at all. This functionality also varies by device type: many Android devices don’t have device-level encryption. And some BYOD tools do a better job of managing the encryption certificates than others, too.
  2. Are files that are viewed on the mobile device ever stored on the device itself? With some mobile devices, once a remote session ends, all traces of the document are removed from the tablet’s memory and storage. With others,there can be some residue, or the file itself could be accessed by an app that you have already downloaded to your device.
  3. Does a document remain under the control of the app, so you can prevent it from being exported outside the app? Some technologies use containers or application wrappers to separate enterprise data and files from other mobile apps. The stricter the control you have, the more secure your files will be.
  4. Can you remotely wipe all traces of the document or history from the employee-owned device, or disable the device entirely if it’s lost or stolen? One often-touted feature of many network security tools is the ability to remotely wipe a phone if it is compromised, or at least terminate any Internet access from the device. But how this is implemented, and what level of IT involvement is needed (such as a panic call into your help desk) to turn off a device differs among the various tools.
  5. Can you disable employee-owned device peripherals through policies?Some products can turn off broadband data connections and force Wi-Fi to save on cellular data usage, or disable a camera or Bluetooth radio under certain circumstances or for particular applications.
  6. Does the BYOD or a single-sign on product integrate with two factor authentication tools? Some tools support third-party multifactor authentication for increased security. For instance, AirWatch Enterprise Mobility Management works with F-Secure’s authentication product. Others, such as IBM’s Endpoint Manager, offer no second factor support.

Netfast is a mobility solution provider with a wide range of mobility solutions, designed to help your organization meet the challenges of today’s wireless workforce.

Please contact us today for a free 30 minute consultation

 

 

Cyber Security Risks: Small – Midsized Financial Services Firms

The cyber security risk is real and the cost is real. Cyber crime and lack of focus are costing financial services firms money and trust. Over the past few years some of the largest financial services firms in the world including Citigroup and JP Morgan Chase have been the victims of cyber attacks. These attacks have caused billions in direct losses due to platform outages, lost customer data and compliance penalties. On top of that there are immeasurable impacts to customer trust, negative PR and brand association.

If the hackers are hitting only the top banks do I need to worry?

Yes, you do. Well publicized, major data breach incidents such as those that occurred at Citigroup and JP Morgan Chase are only part of the problem. Smaller and midsized Financial Services firms should also be prepared for the growing security threats popping up every day.

It’s not hackers only!

Current and former employees, contractors, suppliers and others that you let into your system with consent can also leak data. In fact according to recent research by pwc over 70% of incidents in the financial services industry are originated by a source that did not “hack” into the network from the outside.

In the past year over 60% of SME sized Financial Services firms have experienced at least one incident. Over 20% of firms in the space have seen over 10!

The impacts here vary from stolen customer and employee data to rogue trades, and proprietary business information breached.

Costs

  • Direct costs

PWC research found that 80% of incidents cost Financial Services firms at least $50,000 in direct expense

  • Trust

Your customers and employees trust you with sensitive data. One single incident can irrevocably remove that trust overnight causing funds to be pulled which for a smaller firm can be deadly

  • Compliance

Since the 2008-2009 financial crisis regulatory and compliance policies have increased in the United States. The U.S. Commodity Futures Trading Commission (CFTC) and Securities and Exchange Commission (SEC) have policies in place to fine or bar trading desks that do not meet compliance standards for cyber security.

What can be done? The Netfast Approach to Cyber Security for Financial Services

Our consultative, business first approach allows us to provide vendor-agnostic solutions that improve business agility, reduce security risk and improve profitability. Netfast partners closely with firms such as Palo Alto Networks, Barracuda, and Symantec to help provide best-in-class solutions for our customers. We work with you as a trusted advisor every step of the way to understand threats, find hole and secure your environment.

Our Cyber Security consulting process starts with a network and infrastructure vulnerability assessment

  • Vulnerability Assessment Process
    • We define and classify all network and system resources
    • Then assign each a risk and importance to business critical process
    • We analyze and identify potential threats to each resources
    • We work with you to develop a strategy to address the highest ranked risks first
    • We also define and implement process to minimize the consequences if an attack is attempted
    • We’ll work to also provide certification and government boards the appropriate disclosure if needed. For financial services firms specifically this may include
      • Computer Emergency Readiness Team (CERT)
      • Securities and Exchange Commission (SEC)
      • Commodity Futures Trading Commission (CFTC)

Our certified engineers will work with you every step of the way to identify the risk, understand the threat and resolve problems before they become the next major news story.

Our second step is Penetration Testing

Penetration testing is designed to replicate the actions of a hacker by actively attempting to hack a system. The intended goal is to hire a good-guy hacker to breach the network before a bad-guy gets in.

There are three main areas of penetration testing

  • Social Engineering: As PWC’s research proved humans specifically employees cause most security issues in a business environment. Process and procedures are put in place by IT to mitigate this risk but who is checking to make sure they are followed? Our good-guy hacker will use tactics such as phone and email to find process flaws that may reveal sensitive data.
  • Application testing: using software and application to scan the network and find probable holes. This includes SQL injection, and bots amongst other channels
  • Physical Penetration Testing: testing the physical security of facilities that house sensitive information and devices

After the three areas are complete your Netfast consultant will provide a detailed report that will outline threats found and resolution suggestions. They will then work with our engineering services team and our best-in-class partners to implement remediation if needed.

In conclusion the threat gets worse each day and the risks to business are huge. Financial services firms such as yours are in business to make money and retain profit, so are hackers. Let Netfast come in today to analyze your environment, and solve problems before they becomes tonight’s news.

About Netfast Technology Solutions
Netfast is paving the way for the next generation of IT innovation.  We are disrupting the industry with an IT automation platform providing a vendor agnostic approach to solving complex business challenges.  Netfast executes and delivers consultative IT solutions with a core mission of improving business agility and profitability for our customers.

Netfast Technology Solutions – 989 Avenue of the Americas, 4th Floor New York NY 10018

Data Source: The Global State of Information Security Survey 2015

Data originally posted by pwc on May 25, 2015

The Customer Takes Charge – IT Solutions

The golden age of IT giants is ending. Customizing cross-vendor IT solutions to fit business needs and improve overall operations has become increasingly critical as the giants of the 90s and 00s struggle to pivot in this new world.

According to Peter Burrows, Bloomberg News. Increasingly, smaller companies that want their own data centers will also be able to order gear more customized for their needs than that of the Cisco generation.”

With the IT giants the vendor remained in control. The complicated change cycle, network designs and vendor loyalty promotions ensured the vendor to client relationship ensured greater penetration into the environment and lack of customer control.

Today in the new world needs a vendor-agnostic, custom environment focused to business goals and requirements.

Netfast is a leading consultant in the information technology space. Our mission is to improve business agility and profitability through the application of the latest solutions and always keeping up on the trends. Please contact us today for a free consultation to see how we can help your business.

Financial Benefits of Public Cloud

Companies looking to migrate their existing applications to the cloud can do so easily by taking advantage of the public cloud*. Public clouds such as those offered by Amazon, Oracle, Google and Rackspace offer significant benefits for small business or for those looking for easy migration. It’s only an internet connection a way.

Public cloud lowers infrastructure costs, increase agility, and removes burden off in-house IT resources. Once your applications are in the cloud provisioning is faster, employees are happier and business profitability is improved.

Learn more below about savings in the public cloud and how it can help your business.

Migrating to the Cloud – Reducing Total Cost of Ownership (TCO)

Today you spend money on

  • Server Hardware
  • Network Hardware
  • Maintenance
  • Software Licenses
  • Electricity and Cooling
  • Data Center Space
  • Server Admin Salary
  • Physical Space
  • Bandwidth

Many of these costs you incur twice. First for the onsite infrastructure and then again for the co-lo

With the cloud you eliminate physical server, cooling, and space costs while reducing resource expenses. A single one-time deployment can set your small business up for tens of thousands of dollars or more in annual savings.

Simply put cloud for small business allows you to reduce IT costs significantly. These savings and reduced focus on IT problems can allow for re-investment in your business and increased growth.

Netfast has been leading the way on information technology migrations for over 20 years. Our thousands of satisfied clients are seeing cost savings, improved business process, and agility from IT services and solutions. Want to find out how we can help you? Contact us today and we’ll get started immediately.

*A cloud is called a “public cloud” when the services are rendered over a network that is open for public use. Generally the cloud provider own and operate the data center and connection is via the internet.

Enterprise Class Cloud Computing for All

In the fast moving world of information technology it is sometimes hard to keep up with the latest trends that will affect your business. Cloud computing is the latest trend and hot topic of the moment, and the good news is cloud is not just for the enterprise. Small business can also see significant benefits and resource savings by migrating over. Is it right for you?

Today

  • Software physically installed on an internal server
  • Accessible only within the “environment”
  • Physical space and cooling/electric costs onsite
  • Risk of downtime due to natural disaster, terrorism, or service outages.
  • Hackers know where to hit you

In the Cloud

  • Lower costs – no need to install physical software and pay only for what you need
  • Collaborate and access data remotely from any endpoint
  • Evolve your infrastructure with your business, easy to scale and adjust
  • No worrying about power requirements, space, or software updates
  • Backup and store data offsite, lessen the risk of hacks and downtime

Netfast has over 20 years of experience in the IT consulting and services space. Let our experience make your cloud migration simple and easy. Contact us today for a free consultation or read more on our Cloud Computing site.