What Should be in Your Network Security Toolkit?
Major security breaches have unfortunately been a common occurrence over the past few years. Some studies show that a single security breach can cause $5.9M to remediate damages to your dealership and affected customers following a data breach.1 Breaches can be both intentional, like a hacker accessing your database, or unintentional, like an employee accidentally sharing information. A typical dealer has an average of 50,000 consumer records in their files, putting a dealership as much at risk as large corporations or banks. If your networks aren’t protected, these records could be open to any number of people, putting your dealership at risk. To help stay secure, dealerships should focus on their people, process and technology. Even though most dealers have basic safeguards in place, they often don’t realize how technology can also protect their customers and their dealership. When the right technological tools are in place, this “toolkit” can help you monitor how your network is being used by your employees, customers and “unwanted” third parties and complies with government regulations like Gramm-Leach-Bliley Act (GLBA).
Figure 1 Source: Nuspire Networks, 2015
Trying to protect a network without the right tools is like walking in the pitch-black forest without a flashlight on a rainy night. When you have the right tools in place, you can see the wide range of threats that are directed at your dealership. Nuspire Networks found that, on average, an auto dealership protected by a managed security service sees 153 viruses blocked and 84 malicious spam emails blocked every day. If you don’t have a system in place to monitor these threats, the reality is that your business is subject to these threats, but you’re just not seeing them. The reality is: you cannot secure what you cannot see. So, what’s the answer? Dealers should build a security toolkit that allows them to view network usage, monitor events, and proactively manage risks. So what’s in my toolkit?
Tool #1: Unified Threat Management (UTM)
Advanced threat protection tools help your dealership defend itself against spam, malware, website and application threats BEFORE they enter your business. The bad guys have learned how to get around your firewall and PC virus software to your data. These devices ( UTMs ) act as a bouncer and work to remove bad links from emails, stop viruses and prevent important information from leaving your dealership.
Tool #2: Security Information Event Management (SIEM)
Security threats happen around the clock, but very few of us have time to watch a screen or evaluate 1,000 security events at all hours of the night. SIEM services solve this problem. They provide real-time analysis of security alerts generated by network hardware and applications.
Tool #3: Web content and application filtering
Internet access for your employees or even your customers is a great perk. But, how do you better secure and even optimize this resource? Web content and application filtering products allow you to choose policies that enable or disable website surfing, including Web 2.0 applications embedded in sites like Facebook. Your toolkit keeps you in the know. Building the right network security toolkit can help protect you, your dealership and your customers from vulnerabilities in your network. By making the invisible visible, your business can actively fight off threats without wasting your precious time. Investing in a security toolkit can help you comply with regulatory requirements like GLBA and helps protect you from a breach. If you need help organizing your toolkit, reach out to your CDK sales representative.
Connect & Secure Bundle
CDK’s Connect and Secure package provides a comprehensive set of tools to help defend your network and allows you to see who’s using your business critical Internet access. Our best-in-breed technology solution works for you while you focus on selling cars, parts, and service.
About the Author
Dave Tibbils is a Product Marketing Manager for CDK Global’s networking and voice solutions. He has been involved in automotive technology for 15 years, working with dealers to solve their networking, mobile, security, and communications needs. Dave spends his free time with his three passions: family, friends, and fitness.
Sources: 1.Ponemon, Cost of a Data Breach 2015