In the past six months, technology has had to make leaps and bounds in order for workers and students to maintain productivity.
So why should companies force employees to go back to the same old tech they were using once they come back into the office?
To speak more on this topic is Chief Security Evangelist at ESET
, Tony Anscombe
. Tony and Keri discuss…
"The security needs to be usable within the application and the applications need to be collaborative. But, at the same time, they also need to be secure." — Tony Anscombe
- Why ignoring IT security advancements is a big threat to companies
- How ESET uses machine learning to detect malicious intent
- Why it’s crucial for companies to invest in diversity and inclusion in cybersecurity
- Where tech and information security are going in the next year
Stop ignoring IT security
When your business’s network hasn’t been breached, it’s easy to carry on with the same outdated security measures.
But it’s only a matter of time until your customers’ sensitive data is in the hands of a cybercriminal.
It’s imperative that companies keep security protocols up to date along with the devices and applications your employees are using
. This goes for businesses operating remotely and those that are welcoming employees back into the office.
To ensure every application is being accounted for in your security efforts, take a step back and look at all that you and your employees have implemented. It’s likely that you’ve had to use collaborative apps
to maintain productivity while working from home. Are employees using those applications safely? Are there any vulnerabilities?
Machine learning for security
With ESET’s EDTD package
, users have…
- Endpoint protection
- Advanced ransomware protection
- Encryption of disks
- Cloud sandboxing
To help users analyze suspicious files, ESET uses cloud sandboxing—an application of machine learning—to either confirm or deny a file’s mal-intent.
Basically, when you send a questionable file to ESET, they run the file in a controlled environment and determine if the file is actually malicious. Then, your IT team can know what further actions to take regarding the sender and your network’s vulnerabilities.
Pretty cool, huh?
The future of technology
Tony and the team at ESET understand we need to control the future of cybersecurity—not the bad actors.
To do this, ESET has created the Women in Cybersecurity Scholarship
. Not only do cybersecurity positions need to be filled, but they need to be filled by diverse people with unique perspectives.
Additionally, Tony confirms that tech will continue to be cloud-based in the coming year. Even though some companies have welcomed employees back into the office, collaborative applications are still vital to team productivity.
Tony also encourages businesses to comply with current security legislation. Laws like GDPR actually drive security technology forward and greatly benefit the cybersecurity field as a whole.
Learn more about upgrading your protection
To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk
Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. Or, tune in on our website.