Must-Know Takeaways from the ITA Security Symposium 2014

Image via Shutterstock.com

Image via Shutterstock.com

The Illinois Technology Association is known for bringing the who’s who of tech and entrepreneurship together for periodic discussions on important issues. Executives take note: The latest Verizon Data Breach Investigations Report shows an over 200% increase in data breaches in the past year alone. When we heard that the ITA was holding their first ever Security Symposium to address the growing threat, we knew we had to be there. Check out our key takeaways from the event below.

1. Process matters.
Security is not just about firewalls, SSL, and antivirus software. Your processes and applications are just as important. Policies should be created and communicated to the organization to help cover new advances in software.

IT staff should strive to become trusted advisors to C-level executives, helping them understand when they’ll be able to ease focus on security issues and get back to their core business.

2. Make it stupid-simple for users to stay compliant.
Comfort, ease, and familiarity don’t have to be at odds with security, compliance, and change. That means making sure your organization has the right tools in place.

The cost of business is high if you try to protect against all types of cyber attacks. The reality is with the right collaboration policies and procedures, much of the risk exposure vanishes.

3. Find a partner that helps you manage the hurdles of data collaboration and control.
Data should be secure both at rest and in motion. That means making sure users can access files remotely, transmit them to clients and partners, and collaborate in the most efficient way while staying secure.

The simplicity of the solution, and the solution having just the right bells and whistles, is important. System admins shouldn’t have to spend a ton of time on setup and maintenance of a solution, and end users should be able to quickly and easily use and report as necessary.

When there is a security breach, it must be easy to find out what actions the affected users have taken and immediately respond by limiting access.

Sound exciting? Try Arc for free now! Get Started