This week’s hot topics: Biometrics: The future of online security? The uptake of BYOD and what it means for your business and The importance of Cyber Security training

Biometrics: The future of online security? (+1.0 sentiment)

There has been a lot of chatter this week around passwords – how often should they be changed? Are they even enough these days? And how can we protect ourselves against password crackers? As a result, attention has turned to an alternative, deemed to be the future of online security - biometrics.

With hackers and cybercriminals finding ever more creative ways to circumvent traditional online security steps, the market of biometrics is growing at a fast rate. The main problem? Passwords. Not only can they be easily forgotten by users, but they can be bypassed by hackers with a few personal details and a phone to the relevant company. To tackle this ever-increasing problem, a number of biometric systems have been developed which use facial or voice recognition to try to ensure that only the genuine account holder can access their private information.

Companies should provide stronger authentication so that only authorised individuals and devices get access to what they are allowed is the cornerstone of any good security programme. It is a challenge to prove that people are who they say they are and this has been a common problem ever since computers have been in use. Biometrics appear to be a positive solution to authenticate individuals into systems, applications and data.

Understanding biological identity will be the biggest issue. Everyone has a biological identity, so it can be applied to every single biological identity to cyber space to establish trust. It will be a challenge, but it looks like it can be done. Or can it?


The uptake of Bring Your Own Device (BYOD) and what it means for your business (0 sentiment)

Following a piece of research from Freeform Dynamics, once again, BYOD is up for discussion.  We take a look at industry opinion towards this growing trend.  Craig Mathias, Technology Guide, believes that 'Bring Your Own Device' is "one of the hottest - and most important - trends of the year". However, how much of a trend can it be?

In almost every business everywhere, employees, guests, and anyone else remotely connected with the operation of the firm will be using computing and communications devices purchased for personal use on that business's network. Understanding the opportunities and risks provides the biggest challenge. IT will have to ultimately deal with both, and soon, whether they like it or not.

Currently, BYOD is active in many businesses and is already at work whether those in IT know about it or not. The rapid progress of devices have made work more interactive and time-conscience and BYOD should be encouraged as the default way of talking business. Impressively, the key benefit of BYOD to the enterprise is money. Businesses can save a great deal of money on handsets and related equipment, including, by the way tablets and PCs. Ultimately, capital expense in theory goes to zero and operating expense can be shared however improved user satisfaction also come in the bargain.

BYOD are easy-to-use, promotes networking, provide management visibility and control, and provides excellent security protection. It will become dominant in most business sectors very soon. Are IT professionals ready?


The importance of Cyber Security training (+1.0 sentiment)


Following the introduction of a Cyber Security Challenge contest, we consider how important it is to skill up in cyber security.

Gavin Struthers, senior VP of worldwide channel operations at security company McAfee, said it clearly: "Small Businesses are more prone to attack because they have kess resources to maintain their defences." Although this sentiment is abundantly clear, many small and midsize businesses appear uneducated when it comes to securing their online presence and products.

Cybercriminals are able to hit small businesses hard in the virtual pocket every year using banking Trojans that can control a victim's computer well enough to fool banks. Considering that many banks aren't required to reimburse small businesses if the customer's compromised computer is responsible for the theft, small business owners will need to do their very best to breach this security issue with top-notch training.

Although talent-retention can be seen as the biggest benefit of any small business, it could also be its greatest risk. They can unknowingly let in attackers by clicking on email links, opening attachments, and forgetting security protocols. Cybercriminals can use one password to gain access to all passwords in a company's system to do some serious damage. Potentially, even more worrying, a disgruntled employee can prove even more damaging. To prevent any of these, provide your employees with proper security practices, beginning with choosing good passwords. Limit employee access to sensitive resources such as customer lists and financial information.

“There is no such thing as a completely secure system – businesses will always need to balance where to spend a limited budget, to manage risks and provide opportunities,” said the designer of the GCHQ competition to seek Espionage Experts, identified only as Karl.

Share your thoughts

For all related topics and discussions, please comment below or connect with us on Twitter @MicrosoftBizUK 


Comments (0)

Skip to main content