13 August 2020
The IBM Cost of a Data Breach Report (2020), compiled with research data from the Ponemon Institute, surveyed over 500 organisations who experienced data breaches between August 2019 and April 2020. As the spread of Covid-19 was also creating challenges for business operations during the research period, participants were asked additional questions about the potential impact on remote workforces due to the pandemic. 76% of the participants predicted that remote working practices would make responding to a potential data breach more difficult.
IBM reported that the average total cost of a data breach for companies that had an Incident Response (IR) team and tested their IR plan was over $3 million, compared to over $5 million for the companies with neither an IR team or an IR plan test regime — a difference of $2 million.
Click Here to download a copy of the report.
Kaon Security is pleased to offer Incident response assistance in the form of an Incident Response Execution Pack. Our offering is designed to improve the effectiveness of your team in dealing with a real-life incident. We provide access to a suitably qualified consultant who will assist you with the:
Assessment Phase
Prepare and Deliver Phase
Add-on Option Available
Click Here to download a the FRFT Datasheet.
The accelerated adoption of Working from Home practices in 2020 has seen numerous IT teams and service providers rise fantastically to the challenge of making systems and data more available to higher numbers of remote users. For many organisations the Remote Access Policy is becoming an increasingly important element of their overall security posture.
To cater for today’s rapidly changing environment the content of a Remote Access Policy (sometimes called a Remote Access Control Policy) requires far more consideration than it ever used to. Many organisations will have originally developed this policy around traditional computing and connectivity arrangements that entailed connecting a “remote user” using a desktop or laptop to internal infrastructure via a VPN.
In more recent years enabling remote access to systems and data has been made easier, yet there are vastly more options and aspects to take into consideration if one is to draft a good Remote Access Policy, and get the associated processes and procedures right.
For example, many people use a mobile device to access company data that is predominantly located in the Cloud, whilst others are accessing company data that spans multiple different computing environments.
What are some of the elements of a Remote Access Policy you should consider documenting to cater for a changing environment?
It is also key to ensure that users are aware of the related policies that need to be reviewed and signed in advance of providing remote access, for example:
Read how we have assisted Inner West Council to develop and deliver policies to meet their business requirements. Click Here to view the case study.
View our new video about the key aspects of the Policy Management as a Service offering.