Building a Culture of Tech Security Can Protect Businesses

By

The recent prison escape of drug lord Joaquin Guzman, better known as El Chapo, is a testament to the power of technology within criminal organizations. That Guzman was able to escape from maximum-security prisons on two separate occasions is amazing on its own, but when technology is factored into the equation the situation becomes clearer.

According to speculation, Guzman’s organization has been using everything from cellular jammers to wireless signal detectors to evade capture. These types of technologies and gadgets are readily available and can become extremely powerful when used for illicit activity. And while it’s up to law enforcement to prevent criminals from abusing technology, businesses can do their part to protect themselves and ensure they don’t unknowingly become part of a larger criminal plot.

“With the rapid adoption of cloud technologies, criminal gangs can organize and scale their efforts like never before,” said Ted Hulsy, VP of marketing for eFolder, a company that specializes in secure data center infrastructure and cloud services. “They also can leverage technology to wreak havoc on companies, their systems, and their data. A single, highly motivated criminal actor can compromise, encrypt, or destroy massive amounts of data for ransom or financial gain.”

Image via Shutterstock

That’s a pretty scary scenario, and one that can be avoided with proper security and networking measures. One of the most important first steps is to choose a cloud services provider that offers high levels of security, privacy and administrative control. Beyond that, organizations need to protect themselves from the inside by building a culture of security that is pervasive for all employees. After all, workers create the most risk and vulnerability for a business by using their own devices (BYOD) and accessing sensitive corporate information through outside networks.

According to Hulsy, proper internal training as well as a company-wide commitment to security can go a long way toward combatting threats and protecting a business. Service providers have even more at stake when it comes to maintaining security compliance, and have an even bigger job when it comes to building a culture of security. Proper personnel training as well as strategic partnerships with vendors and suppliers offering secure solutions are absolutely essential practices, along with enterprise-grade encryption, authentication and administrative control. And that’s where eFolder could help.

“eFolder products and services are designed from the ground up for secure deployment by service providers,” said Hulsy. “[The company] adheres to the highest standards of data security by engineering systems that protect and maintain data, while ensuring its confidentiality.”

Those measures include military-grade encryption, SSAE 16 Type II certified data centers and adherence to a number of additional network transmission and encryption standards—as well as business-grade cloud backup, continuity and file sync services.

Technology is always subject to abuse by criminals, hackers and others with malicious intent. But businesses need not be vulnerable to exploitation and proper security measures, from the premises through to the cloud, can combat fraud and abuse from organizations like El Chapo’s.




Edited by Dominick Sorrentino

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More