7 Threats To Your Data Security

7 Threats To Your Data Security

Cloudleaf Head of Marketing, Nitesh Arora talks to MHI, nations largest material handling, logistics and supply chain association, about data security in the world of Internet of Things (IoT). Below is a quick snippet of the original article in September Issue of MHI Solution Magazine.

Technology controls that supplement training and protocols

Understanding that mistakes will still be made by employees, material handling companies can implement technological tools that add an extra layer of security to protect data—from unintentional and intentional efforts to access or steal data, says Nitesh Arora, head of marketing for MODEX 2018 exhibitor Cloudleaf.

Implementing network security via a widely-used virtual protected network (VPN), along with the use of hardware two-factor authentication (2FA) security keys and endpoint security tools can address some of the risk of unauthorized access or losing data on a laptop or mobile device that is stolen or lost, says Arora. Not only can controls be established that identify what data the employee can access based on their role, but information is encrypted as it travels from the server or cloud to the user, making it hard to crack, he says. “These steps are critical as more companies allow their employees to use cloud applications and their own devices for work.”

It’s important to remember that data is not just transmitted or accessed by a person, says Arora. “With the growth of IoT—sensors on pallets, containers, conveyor belts or forklifts in a warehouse, for example—devices are constantly sending information,” he points out. Encryption of data at the edge and in the cloud with AES, PKI or SSL certificates—in transit and at rest—is essential, he adds.