Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

Is banning the right solution to dealing with problem apps? [Q&A]

Sep 20, 2023 - betanews.com
The article discusses the rising concerns over data privacy and security in the era of digital expansion. It highlights the increasing number of cyber threats and the need for robust security measures, particularly in the public sector. Hexnode CEO, Apu Pavithran, suggests that banning apps like TikTok is not the only solution and emphasizes the importance of implementing clear regulations, strong security measures, and promoting transparency. He also discusses the need for strong data encryption, effective content filtering mechanisms, and thorough vetting of third-party integrations to ensure data security.

Pavithran further explains the need for a strong device management strategy, including features like remote device tracking, data wiping, and policy enforcement. He suggests the use of multi-factor authentication and secure network protocols to prevent unauthorized access and data interception. The article also discusses the importance of a Zero Trust Architecture and Data-Centric security in defining the IT security perimeter in the public sector without limiting growth and innovation.

Key takeaways:

  • Hexnode CEO, Apu Pavithran, believes that banning apps due to data concerns is unenforceable and suggests that CISOs should take matters into their own hands when it comes to app and web management and security.
  • He suggests implementing clear regulations and standards, investing in strong security measures, and promoting transparency in technology platform operations as alternatives to banning apps.
  • For mobile device security in the public sector, Pavithran recommends implementing a strong device management strategy, using multi-factor authentication, establishing secure connections for mobile devices, and encouraging responsible device usage.
  • He also recommends implementing a Zero Trust Architecture supported by Data-Centric security, strong data encryption, robust Identity and Access Management (IAM) solutions, and proactive monitoring systems to define an IT security perimeter without limiting growth and innovation.
View Full Article

Comments (0)

Be the first to comment!