A de-provisioning proverb: When a door closes, just make sure you don’t leave a window open

disgruntledA forensic analyst confirmed something that I long believed to be true. One of the greatest threats to an organization comes from within. Not everyone who exits a company leaves with a handshake and a gold watch. Often times there are hard feelings; that the employer wronged the former employee and that employee will exact a matter of revenge or feel justified to extract some sort of perceived compensation. Now this isn’t meant for you to look sideways at the person sitting in the next cubicle. However, access policies  needs to be a part of any company’s  internal risk assessment and security policy.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Preventing Data Leakage: Proactive Security from the Cloud

The lack of a proactive security strategy is much like an ostrich putting its head in the sand. It is a matter of when, not if attacks will happen. As enterprise systems are exposed to substantial risk from data loss, theft, or manipulation, a proactive unified approach deployed and managed from the cloud can provide a better balance of data leakage prevention, protection of IP assets, maintenance of compliance standards versus cost/resource responsibility.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

REACT to the Cloud: A tale of horror and unified security

Today’s is a cautionary tale. One that you’ve probably heard before, but I promise a new spin on making sure it won’t happen again. It’s a true story. It recently happened to a colleague’s friend’s business. It was a dark and stormy night…

Introducing a new security paradigm that leverages the cooperative functionality of various security tools. However, the key is still monitoring the results in real time; and the best case scenario (most efficient/effective means) for most companies to achieve this is via the cloud.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

 

FFIEC’s recognition of cloud security advantages is good for modest financial orgs

How credit unions, smaller banks can now use outsourcing for compliance using security-as-a-service. Last month the Federal Financial Institutions Examination Council (FFIEC) shared an opinion on the viability and security of cloud computing. In the four-page statement, the interagency body empowered to prescribe uniform principles, standards, stated that cloud computing is “another form of outsourcing with the same basic risk characteristics and risk management requirements as traditional forms of outsourcing.”

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

 

 

Casting Light on Shadow IT and ID

Watching vulnerability cracks in your network widen via unauthorized application usage. It happens every day. It’s not a new term or concept. You probably recognize that it’s happening within your own organization. Someone in sales or research or HR or some other department finds an application they think might help with their goals–and they download it without any approval from IT. Seems harmless enough, but the creation of this Shadow IT actually creates more problems and its up to the IT pro to wrangle them all in.

READ THE ENTIRE ARTICLE AT CLOUD ACCESS’ NEW BLOG SITE: HERE

Identity Management in the Cloud: A Matter of Function, Control, Cost

User identities are at the core of your business. Organizations need to manage access to corporate resources and systems to an ever changing flux of employees, consultants, partners, vendors, suppliers, and customers. And each has their own agenda in terms of the information they wish to access. Without an identity management framework, all any of these people need to do is knock on the door and the doorman will let them in. This issue is what is the best way to deploy and manage such and initiative. In that respect there are three points of comparison of whether the cloud or a more traditional deployment is best suited for an enterprise: functionality, control, and cost.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE