In this interview, Mobile Mentor founder, Denis O’Shea, and MRK Technologies CTO, Chris Prewitt, take a critical examination of security in the endpoint space and beyond.
MRK Technologies is a Managed Security Service Provider (MSSP) that has been active for over 30 years. The Ohio-based company empowers businesses by detecting, investigating, and communicating threats for clients to identify and eliminate security concerns. As CTO, Prewitt oversees the security of all technology MRK monitors on behalf of their clients.
Skip ahead to view key segments from this conversation in the links below:
BLURRED LINES BETWEEN PERSONAL DEVICES AND WORK DEVICES
-
Backing up cloud data
-
Leveraging Zero Trust to protect data on all devices
-
Preventative Policies around apps and data
RECONFIGURING IT TEAMS AS CLOUD-FIRST BUSINESSES
-
Change management, communication, and service delivery to ensure cloud adoption
-
Selecting partners and advisors to guide your team to the cloud
MANAGING A CLOUD ENVIRONMENT AS OPPOSED TO A LEGACY ENVIRONMENT
-
Historical on-prem strategy vs modern cloud-first environments
-
The pandemic’s role in the evolution of the security
EVOLVING FROM A LEGACY MODEL OF NETWORK SECURITY TO A FUTURE MODEL
-
Extending preventive and administrative controls to devices off premises
-
How attackers are reaching workers through phising and social engineering
-
Base Security Models for Endpoint Security
-
Zero Trust and testing the posture of devices and authorization
-
Using identity as a perimeter to safeguard data
IMPLICATIONS OF POOR PASSWORD HYGIENE BEHAVIORS
-
Employee experience and its effects on security
-
Attack strategies that compromise password credentials with poor hygiene
EMPLOYEES’ BIAS TOWARD PERSONAL PRIVACY OVER COMPANY SECURITY
-
Employee concerns about personal privacy
-
The overlap of security and privacy
-
Casting security as a privacy consideration for individuals
-
Adjusting the culture of an organization to prioritize company security
PRACTICAL GUIDANCE TO PROTECT YOUR ENDPOINT ECOSYSTEM IN THE YEAR AHEAD
-
Securing endpoints
-
The importance of aligning security investment and risk
-
Identifying critical data and systems
-
Preventive and protective controls