What Enterprise Security means in the SMAC era

With the proliferation of SMAC, confidential corporate data is in danger of moving out from earlier controlled environments, requiring organizations to evolve their IT architecture to ensure data security across multiple platforms

Let’s take the example of threats posed by social media platforms, which are increasingly being used by enterprises to build their brand and engage with customers. Sometimes employees share confidential data unknowingly on social networking platforms, which pose a danger of targeted attacks to organizations. Also, there is no clarity on how information shared on channels like WhatsApp, Viber, etc, is getting stored and is being used.

“The links and the other URLs shared on social platforms are the biggest security issues. And any wrong post can create a severe impact on personal as well as corporate reputation. Moreover, there is still a question mark on how the personal information shared on various social platforms is being used,” says Jayjit Biswas, Divisional Manager- Information Security & Compliance, Tata Motors.

Further, if an employee clicks on a malicious link on a social networking site, his credentials may get compromised, making the entire network vulnerable to exploits. The danger posed by social media is corroborated by a report by Symantec, which says that India is the second most targeted country in the world for social media scams with over 80% of these being carried out through manual sharing.

Somak.Shome.Chief.Information.Security..Compliance.Officer.SREI.Infrastructure.Finance.Ltd

We are working on the demonstration of a security initiative called Information Rights Management, which works for all unstructured data – Somak Shome, Chief Information Security & Compliance Officer, SREI Infrastructure Finance

In this scenario, password-based protection system is not good enough anymore. Organizations need to focus on designing a next-generation security architecture with deep network integration. Similarly, mobile devices bring in significant security risks. For instance, a report by Check Point Software says that 47% of organizations have experienced a security breach as a result of compromised mobile device.

Leave a Reply

Your email address will not be published. Required fields are marked *