Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»News»Identity Protection Is the New Business Imperative
    News

    Identity Protection Is the New Business Imperative

    Kaluka wanjalaBy Kaluka wanjalaMarch 13, 20183 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    AON Cyber risk kenya
    AON Cyber risk kenya
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    Business is evolving in the face of two opposing technology trends: The transformative power of the cloud and the mounting cost of cybercrime. Living at the intersection of these new business realities are billions of people, putting pressure on businesses to ensure that employee and customer identities are protected.

    We see new data and identity thefts in the news on a weekly basis. More than three billion customer data records were lost to high-profile attacks in 2016 alone, with more than 60 percent of all data loss traced back to compromised identities.

    Establishing trusted identities is how a web-based economy functions – and criminals know it. The good news is that businesses have more identity management and security tools at their fingertips than ever before. The challenge is knowing where to start.

    Employees define the corporate perimeter

    Until recently, preventing unauthorised access to data meant establishing a firm perimeter of defense and applying unique authentication and access control policies to every website, app or service on a network. This often led to increased support calls, decreased productivity and insecure work-arounds such as carrying sensitive information on thumb drives.

    Today’s identity protection strategies start by recognizing that employees now define the corporate perimeter, and people are still the weakest link in a network. Just as the people around us engage with and trust us on sight in the physical world, our online identities are presented and verified hundreds of times each day as we navigate documents, apps, websites and the countless other ways we use technology to retrieve data.

    To protect that data, you must enforce policies that follow each individual identity as it moves throughout the network requesting data. Recognising that corporate perimeters are defined by individuals, who are themselves the targets of increasingly sophisticated attacks and social engineering, has created a new security mindset that puts even more focus on internal threat detection.

    Adopting an “assume breach” mindset

    In cybercrime, patience is rewarded. Attackers typically lurk on a victim’s network for more than 140 days before they are detected. Acquiring someone’s credentials and using them to gradually elevate permission has become the most effective means of reaching lucrative company data.

    Assuming you’ve already been breached forces you to be vigilant about monitoring patterns on your network. You can then use the power of machine learning and behavioural analytics-based tools to quickly identify threats and anomalies before they culminate in more damaging attacks. Many of those capabilities may even be built into the same solutions used to manage and verify identities so that criminals cannot access the network in the first place.

    Improving identity management and staying out of the headlines

    Using risk-based conditional access to improve identity management is quickly becoming standard procedure as we work on finding new ways of reducing the burden on the user.

    Thanks to biometric features like Windows Hello, for example, you don’t even need to enter a password anymore to enjoy the increased protection of multi-factor authentication. Smart local authentication, combined with an intelligent access management solution, lets IT embrace the reality of users defining corporate boundaries by defining secure conditional access criteria based on things like location, app and device compliance, or even an aggregate risk score.

    Creating more transformative user experiences and increasing employee productivity does not have to introduce risk. Businesses can go a long way toward staying out of the headlines by recognising that their employees define the corporate perimeter, adopt an “assume breach” mindset, and make use of multi-factor authentication access polices.

    Also Read: Four Reasons Why Cyber-Security Should Be On Your 2018 Agenda

    Microsoft
    Kaluka wanjala
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    Editor at TechArena. I cover all things technology and review new gadgets as I get them. You can reach me on email: [email protected]

    Related Posts

    Jahazii Raises $400,000 in Pre-Seed Funding

    October 15, 2025

    Paradigm Tower Ventures Debuts with IHS Rwanda Acquisition

    October 15, 2025

    NTT DATA and Fortanix Announce Global Partnership to Strengthen Security in the AI and Post-Quantum Era

    October 15, 2025

    Comments are closed.

    Latest Posts

    Jahazii Raises $400,000 in Pre-Seed Funding

    October 15, 2025

    Paradigm Tower Ventures Debuts with IHS Rwanda Acquisition

    October 15, 2025

    NTT DATA and Fortanix Announce Global Partnership to Strengthen Security in the AI and Post-Quantum Era

    October 15, 2025

    Triply Partners with Verto to Power Seamless Cross-Border Payments for Africa’s Travel Sector

    October 15, 2025
    Advertisement
    Editor's Pick

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    Change leaders must put security at the heart of transformation

    October 13, 2025

    Westcon-Comstor’s Vincent Entonu: “Africa Is Not a Late Adopter of Technology”

    October 10, 2025

    What You Need to Know About Safaricom’s New VybCall Feature

    October 8, 2025
    © 2025 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.