Cloud Security

Source: SANS security tip
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.
Cloud Security

Why CFOs should spend more on cybersecurity

original link:  http://newsroom.cisco.com/feature-content?type=webcontent&articleId=1738657&source=The%20Network

It’s more than avoiding loss- it’s also about innovation.

There’s no question that CFOs are increasing spending on cybersecurity. While many are doing so in an effort to protect against threats, others also see cybersecurity investment as an opportunity to innovate.

As such, spending on cybersecurity becomes more than about using dollars to protect the business and “avoid loss.” It also becomes about addressing risk and innovation – thus enabling growth – within an organization.

More CFOs are viewing cybersecurity less as a “cost center” and more as a revenue generator.

See also: Security for the digital world

When asked how much they expected their company’s cybersecurity spending to change in the next 12 months, 41 percent of the CFOs recently surveyed by Cisco said they expect it to increase “significantly.” Another 46 percent said they expect it to increase “somewhat. When asked how much the availability of business benefit metrics would affect their decision to invest in cybersecurity, 38 percent of CFOs said they would be “much more likely to invest.”  Another 43 percent said they would be “somewhat more likely to invest.”

Going digital clearly fuels business opportunities within the private sector by connecting people, processes, data and things. But it also increases vulnerability to cyberattacks. Successful hacks disrupt business, erode consumer confidence and impact an organization’s reputation.

See also: The network is the security device

The Ponemon Institute’s 2014 Cost of Data Breach Study: United States puts the average cost for each lost or stolen record at $201, and the total average 2014 cost paid by organizations at $5.9 million for each data breach, up from $5.4 million in 2013. The surging costs are attributable to the “loss of customers following the data breach due to the additional expense required to preserve the organization’s brand and reputation.”

Steve Durbin, managing director of the Information and Security Forum, points out that while organizations can make sure systems are hardened and back up and running, that “trying to manage a reputation in the course of public opinion is tremendously difficult.”

There is growing evidence that digital-focused cybersecurity innovations and strategies can both neutralize the time and intelligence advantages hackers develop. Through digitization, organizations can also create significant business advantage for operational responsiveness, adaptability and learning, customer experience and loyalty, risk mitigation and overall competitiveness.

The CFO of a major airline recently shared his thoughts on the shift in perception about cybersecurity.

“Cybersecurity is really what makes your business model operational. Without that cybersecurity level you’re still in beta as a company,” “Cybersecurity is really what makes your business model operational. Without that cybersecurity level you’re still in beta as a company,” he said. “You need that operational layer that’s no longer mandatory. It’s no longer defensive. It’s part of your core business.”

In his opinion, cybersecurity going forward can help a company actually drive innovation.

“When they’re designing their business model around these operational elements they’re allowed to be more innovative and they’re allowed to be more agile…” he said. “Cybesecurity can represent a key competitive advantage in the market when you think of it as an enabler for unlocking technology and helping a company be more nimble.”

Cybersecurity as baseline

Financial executives are getting increasing pressure to not just escalate market share, but to do so in a trustworthy manner.

“More companies are reaching out to their third party providers, vendors and customers electronically, so going forward they are expected to have much more focus on a robust security strategy and the right security solutions,” Durbin said. “So now cyberinsurance is more being viewed as part of the intrinsic baseline of an organization expecting to go on a growth trajectory.”

Traditionally, he continues, cybersecurity has been viewed as how strong is a company’s perimeter, how can we keep people out?

“But when it comes down to growth, financial executives see they have to investing in a certain amount to fit the purpose of both today and tomorrow,” Durbin added. “To operate effectively in cyberspace, organizations are now required to have robust cybersecurity processes in place, be able to demonstrate them to investors, consumers and customers and regulate them when it’s appropriate.”

Indeed, nearly one-third of CFOs recently surveyed by Cisco said “enabling business growth” was a major consideration when considering their level of cybersecurity investment.

It’s clear that cybersecurity is no longer just a matter for an organization’s IT department.

“Too often cybersecurity is a matter that gets relegated to the IT department,” the airline CFO said. “This is something that needs to be owned across the entire organization.”

###

The contents or opinions in this feature are independent and may not necessarily represent the views of Cisco. They are offered in an effort to encourage continuing conversations on a broad range of innovative technology subjects. We welcome your comments and engagement.

 

Why is there Bluetooth on the Meraki MR32?

Technologies: Bluetooth Low Energy

  • Universal support, enabling real world applications
  • Dedicated, efficient hardware with simple management
  • Putting beacons to work
Meraki MR32 and MR72 access points include high performance 802.11ac WiFi, a dedicated security radio, and something extra: Both APs incorporate a dedicated Bluetooth radio and antenna, extending the power of location awareness and returning meaningful value to customers.bluetooth-low-energy

Universal support, enabling real world applications

Bluetooth Low Energy (BLE) was incorporated into the Bluetooth 4.0 specification in 2010 and experienced rapid uptake, including all the major operating systems, many of the smartphones and tablets we use today, plus a new breed of devices like fitness bands and simple RF tags. BLE excels at sharing small packets of data, referred to as attributes, over a low energy link, and is frequently used for health monitoring, proximity detection, asset tracking, and in-store navigation.

Dedicated, efficient hardware with simple management

The MR32 and MR72 access points contain an integral Bluetooth radio and dedicated antenna, providing superior coverage and convenience to support these applications. In other words, no other hardware is required, it’s all built-in.

BLE, as its name suggests, is designed to sip power, enabling some dedicated beacons to run for years on a single battery, opening up new practical applications at low cost. Bluetooth is also an efficient standard when it comes to radio interference. Operating in the 2.4 GHz ISM band, it uses frequency hopping technology to circumvent interference problems often seen in this band. Cell sizes can be tuned to the application requirement, with potential range comparable to 2.4 GHz WiFi, even taking into account the low power requirements of the standard.

Everything is managed through the Meraki dashboard, with a monitor view for identifying Bluetooth devices, their connectivity history, and tagging for simple organization and search.

Putting Beacons to work

The MR32 and MR72 APs enable customers to begin developing practical applications for BLE devices. These can be broadly categorized into ‘push’ applications, where the AP informs an aware device that it is in a certain location, or ‘pull’ applications, where the AP listens for beacons and uses this information to assist with asset tracking and control through the dashboard. Location analytics based on BLE generally work on an opt-in basis, with the consumer enticed via an app which leverages location for mutual benefit.

Fortinet is the leader in UTM

Unified Threat Management (UTM)

Connect and Secure Your Distributed Enterprise

Securing your Distributed Enterprise is challenging and complex. With applications moving to the cloud and more devices accessing the network, Distributed Enterprise offices are more vulnerable to emerging threats than ever before. Fortinet’s Unified Threat Management solution — delivered by FortiGate and FortiWiFi appliances — combines advanced security features along with switching and wireless controller functionality into a single platform. This reduces complexity, delivers outstanding performance, and is very easy to manage.

Consolidated Security and Access

Distributed locations such as those found in retail, healthcare and education require advanced security and connectivity for a wide variety of IT functions, including wireless LAN, switching and WAN access. This diverse range of requirements needs multiple appliances and it is expensive and complex to manage. Fortinet’s UTM solution consolidates all of them in one single device which lowers the TCO and helps protecting against the latest cyberthreats.

Single Pane of Glass Management

Given the widely distributed nature of many enterprise environments, the ability to quickly provision, scale and control your security management is critical. Together, FortiManager and FortiAnalyzer provide a unified administrative console to oversee your distributed security architecture.

Highlights

  • Leader in Gartner’s UTM Magic Quadrant since 2008
  • #1 in UTM unit market share, according to IDC
  • Best Price/Performance in UTM
  • Industry leading threat protection provided by FortiGuard
  • High switch port density with PoE capability
  • Integrated wireless LAN control and optional 3G/4G connectivity
  • Easy-to-use management, scalable to thousands of distributed locations

Secured by FortiGuard – The Driving Power behind Fortinet’s Robust Security

FortiGuard Labs delivers global, real-time synergistic protection 24×365 against new and emerging threats. Woven into the full range of Fortinet products, these proactive updates keeps your security solution one step ahead.