SECURE OFFICE NETWORKS
CONTINUED
vectors ensures employees can avoid risky behaviours that may put the business at risk. Michael adds that businesses should be implementing a proactive strategy to fight against threats and safeguard sensitive information. He believes it’s crucial for data to be securely backed up and protected by a strong password policy. Additionally, he says companies need to be more aware of the weaknesses already pervading their infrastructure. “Many businesses still use antiquated technology in their IT systems, and hackers seeking an easy victim may easily take advantage of this,” he says. “This technology should thus be upgraded whenever feasible to maximise defences, or in the case that this is not possible, additional precautionary measures should be put in place to discourage any potential attackers.”
at Redsquid.” Resellers and dealers should always be offering expertise and advice when talking to customers, particularly where business leaders may not have access to the right security expertise in-house. In smaller businesses, for instance, the right guidance is particularly crucial. The advice given needs to be comprehensive and holistic, Paul notes: “The advice should include that cybersecurity is not limited to certain devices like printers and scanners,” he says. “Cybersecurity is a much bigger issue, and a comprehensive approach must be taken to secure a network rather than simply focusing on individual items.”
Chris Bates business unit manager – print and supplies, UK and Ireland TD SYNNEX
Evolving trends The evolving digital landscape places
additional pressure on security providers and companies to update their security structure. A layered, holistic approach to protecting data, with updated solutions is essential to fight back against new and emerging threats. As Paul said, cybersecurity may now be too complex for companies to handle entirely in- house. “If your organisation does not have the resources and expertise to deal with attacks, then look outside your organisations for companies that have expertise in the field.” Innovative security providers and resellers will be able to provide layered protection solutions for a network, combining aspects of discovery, risk management, protection and prevention. But continued education will be crucial for business leaders too. Policies will need to be implemented to ensure everyone is informed of what to do in the case of an attack. New password strategies will need to be implemented and secure systems for backing up data must be in place. “With security it’s important to provide protection that is proportionate to the risk – but yes, any printer that is connected to a network – whether located in the office or the home can provide a way for hackers to infiltrate networks, so they do need to be protected,” says Chris Bates, business unity manager at TD SYNNEX. “We’d always recommend that all connected devices are included in any cybersecurity assessment.” While printer vendors are building more security into their devices, companies will often need to add further layers of protection on top to thrive in the changing ecosystem. An unsecured printer is a problem no business leader should leave un-addressed.
uk.tdsynnex.com
“
With security
it’s important to provide
protection that is proportionate to the risk – but yes, any printer that is connected to a network – whether located in the office or the home can provide a way for hackers to infiltrate networks.
Reseller opportunities With the increasing importance of security provision, it means that security providers, resellers and dealers need to be on the frontline, providing guidance and support to customers – new and existing – looking to update and enhance their security structure. “There are no longer any end points that are safe. If an endpoint is connected to a network, it needs to be secured, and that security must be regularly updated,” says Sohin. “We’re committed to having these conversations with our customers and guiding them in the right direction. ”Today, we’re seeing more business owners realising the threat that are posed on the networks of home workers. This calls for much more bespoke technology solutions which we have implemented into our product roadmap
”
34
Powered by FlippingBook