Intelligent CIO Africa Issue 33 | Page 47

/////////////////////////////////////////////////////////////////////// their actions, company security policies and best security practices such as the use of strong passwords. Furthermore, training should be an ongoing activity rather than a one-time exercise. specifically for this as they encrypt data and hide the IP address of the user. So even if the employee is accessing sensitive company data via an insecure connection, potential attackers wouldn’t be able to extract any useful information. Use of VPNs Identity access management As employees will often use their personal devices when connecting to company networks, it is best to provide them with a secure means of access. VPNs are designed In the world of cloud and the distributed workforce, there is no more important security task then being able to identify users in a strong way. I cannot emphasise how www.intelligentcio.com FEATURE: MOBILE MANAGEMENT Nicolai Solling, CTO, Help AG INTELLIGENTCIO 47