BlogThree Tips To Secure Enterprise Communications Management Threats

Three Tips To Secure Enterprise Communications Management Threats

January 6, 2016, Communications Lifecycle Management

Enterprise communications management threats are expensive. The average data breach cost for US companies is over $6.5 million, with accumulated expenditure ranging from handling lawsuits, to recovering from the reputation impact of security issues.

Protect Company-Issued Devices

Many employees use smartphones, tablets, laptops and other company-issued devices for essential business duties. A password, pin code or other authentication method provides a baseline defense against unauthorized access.

Smartphones and other mobile devices are also at risk for getting lost or stolen, with FCC data suggesting that one in 10 thefts and robberies involves a mobile device. Physical security locks provide protection for company-issued devices, and remote kill switches can stop company data from falling into the wrong hands.

Spam and Phishing Email Best Practices

Employees have to take extra time during work hours to sort through and locate relevant emails when their inboxes are filled with spam and phishing emails. The time spent dealing with these unwelcome emails costs companies $874 in lost productivity annually for every employee. While enterprises can reduce spam through various email servers and spam filtering solutions, employees also need to apply best practices to handle the messages that get through. To prevent productivity loss from spam, employees may have a pre-approved list of senders within the organization, and emails outside of this list should be ignored. Employees can also use a feature to flag suspect messages that make it past existing spam filters.

Phishing represents more than a productivity drain. If employees open attachments or follow links, they may compromise enterprise security. Phishing email best practices include avoiding attachments sent through email, double-checking links to confirm they lead to legitimate company websites and flagging suspect messages to allow email security personnel to take a closer look.

IT Infrastructure Integration

Enterprise IT infrastructure incorporates a wide variety of technology, ranging from all-in-one software solutions to custom apps. The average enterprise uses 508 applications per business, according to Forbes. Missing a security update in one of the hundreds of apps could open up a vulnerability point, and it’s hard to pinpoint how intrusion occurs when dealing with that many applications. Combining and streamlining the IT infrastructure improves responsiveness in the event of a disaster or emergency, and also makes it easier for the enterprise to foster common goals.

The modern enterprise faces security threats from many sources, but it’s possible to mitigate or minimize risks with good policies, an integrated infrastructure and device protection.
Download Case Study