Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Security Training: How to Protect Your Customer's Business from Cyber Attacks

April 29, 2017

After the high-profile security breaches that dominated the headlines in 2013 and 2015, security training is at the top of many an IT decision-maker's priority list. No one wants to be the next Target or Sony, and as more recent data breaches show, even SMBs aren't safe from cyber attacks that can lead to damaged brands, heavy fines, lost sales, and even lawsuits. Are your customers coming to you with security questions and concerns? Keep these guidelines in mind as you work to protect your customers' businesses from cyber attacks.

Employees are a business's biggest vulnerability

Very often, employees themselves are the sources of compliance violations, security holes, and data breaches—especially in BYOD organizations. Many people aren't familiar with cybersecurity best practices, such as choosing strong passwords, using different passwords for different services, and regularly changing their passwords. Others are aware of best practices but choose not to follow them. And many use the Internet less cautiously on personally owned devices than they would on corporate devices. This adds up to the perfect set of circumstances for a hacker or scammer to exploit. Passwords can be guessed or stolen, and if an employee uses the same login credentials for multiple sites, one hacked account could open the door to infiltration into corporate resources, too.

To address this, advise your customers to provide and require cyber security training to all employees with access to corporate network resources and data. Additional technology measures, such as strong password policies and enforcement, will also help fill in the security holes that careless employees can create.

Cloud security shifts the focus to data

More and more enterprises are turning to the cloud for business-critical applications like CRM, ERP, HRMS, and accounting. The cloud provides significant cost benefits and improves flexibility and scalability, but entrusting sensitive corporate data to third-party cloud providers increases the risk of a data breach if not handled properly. Cloud services are often targeted by cybercriminals, and the enterprises that use the cloud services have little control over the CSPs' infrastructure security.

Where enterprises can beef up their security is around the data itself. Help your customers develop a plan for cataloguing and prioritizing all their cloud-bound data by value and relative risk, then communicate the benefits of cloud data security technologies such as client-side cloud data encryption. Such technologies protect corporate data before it ever leaves the premises and allow enterprises to retain exclusive control of their encryption keys, so that even if a CSP is breached, your customer's data will remain unreadable to anyone who is not authorized to access it.

Antivirus, malware protection, and intrusion detection still matter

Even in today's mobile, BYOD, cloud-dominated business world, more traditional security technologies like antivirus, malware protection, and intrusion detection still matter. Most enterprises still maintain significant on-premises compute, network, and storage investments, after all, and those investments must be secured. Make sure your customers' endpoint and network security solutions are up to date. Today's antivirus, malware protection, and intrusion detection technologies make use of machine learning, Big Data, and massive threat intelligence databases for better detection rates and faster response. Your customers should be taking advantage of these advances.

Cyber attacks are a very real concern in the modern enterprise, but the threat of a breach doesn't have to hamper a company's innovation. Are you ready to lead your customers to the most secure use of today's enterprise technologies? If you need more information, talk to one of our security experts today.