Cybercrime is a growing epidemic that affects businesses of all sizes. Organisations have a responsibility to protect the data of their employees and customers. So they are investing in expensive hardware and software solutions. Yet businesses don’t realize that without effective management of those solutions, every component they add to their IT inventory becomes a new point of vulnerability. Cybercriminals can exploit unaccounted and out-of-date hardware and software to hack systems. So companies need to put effective IT asset management solutions in place.
IT managers have to keep track of their IT inventory. They have to deal with contracts, licenses, updates, and regulatory compliance issues. The use of the cloud and mobile devices are adding new layers of complexity. In the early days, managers could get away with using spreadsheets to keep track of their IT assets. Today most sophisticated operations use some form of IT inventory management software. These tools are better suited to deal with various aspects of IT asset management:
Hardware Asset Management: IT departments have been dealing with servers and workstations for a long time. But that doesn’t mean that it has gotten any easier. A good ITAM practice requires that hardware is properly tagged and tracked throughout its lifecycle. The firmware of each hardware needs to be updated regularly. A good IT inventory management software has the provisions to handle the complexity of dealing with various aspects of hardware management.
Software Asset Management: Software provides a different set of challenges. IT departments have to prevent unauthorized software installations. They have to ensure security updates are regularly applied to installed applications and access management rules are followed properly. Good ITAM tools can keep track of software updates, license expirations, and compliance requirements. Regulatory audits are easier with software asset management.
Cloud Asset Management: Cloud-based services like SaaS, IaaS and PaaS are relatively new developments. So IT departments are still trying to figure out how to address various issues. In a pre-cloud environment, teams had total control over the IT inventory. But cloud environments use the shared responsibility model. Most ITAM tools are still not highly evolved for cloud asset management. So IT teams need to pay special attention in this area.
End-User Mobile Device Management: More companies are adopting bring-your-own-device (BYOB) policies. Even though its great for productivity, its a nightmare for implementing security. Tracking and monitoring BYOB devices through IT inventory management is a high priority for IT departments.
For any modern organisation, it’s not possible to create a robust cybersecurity program without having an efficient ITAM solution. There are just too many tools and services to keep track of.
For example, a single employee might have a PC, a mobile phone, and a tablet. In addition, the employee might have access to various servers and cloud applications. If cybercriminals can obtain even one password to any of these endpoints, they can often use that password to hack into other systems to gain more valuable information.
Also, cybercriminals can launch sophisticated phishing attacks, exploit software vulnerabilities or steal employee devices. IT teams need to fight battles on all fronts by keeping software and hardware up-to-date and having the capability to shut down stolen devices. Recent attacks in the UK shows cybercriminals are taking advantage of all these vulnerabilities.
British Airways Hack: Financial information of around 380,000 British Airways passengers were hacked during a 15-day breach in August 2018. Initially, British Airways didn’t know how the hackers got access to the data as there wasn’t any internal breach. Later security experts discovered that the scripts for its baggage claim information page were changed just before the hack started. The cybercriminals exploited the weaknesses of those scripts to intercept customer information. This shows an important reason for having ITAM solution. There is no information available about how BA managed its IT inventory in this case. But good ITAM solution would make finding vulnerabilities like this easier for security experts. Experts would be able to discover problems faster using ITAM historical data. Without proper ITAM, the same task will take significantly longer or even make the problem untraceable. It will increase the chances of future attacks.
NHS WannaCry Attack: The WannaCry ransomware attack of UK’s National Health Services (NHS) caused cancelling of 19,500 medical appointments, locking of 600 computers at GP surgeries and put 5 emergency centres out of service. The damage could have been worse if a security researcher hadn’t accidentally discovered the kill-switch to the ransomware. But this attack could have been prevented in the first place through IT asset management. If NHS had updated their Windows operating system properly, the WannaCry could not have caused this havoc.
IT asset management will not solve cybersecurity problems automatically. Businesses need to design and implement their IT inventory management software with cybersecurity assessment in mind.
However, cybersecurity-aware ITAM solutions will help your business in multiple ways. Here are some of the benefits:
ITAM solutions designed with cybersecurity objectives will help you find security risks faster. If you have a configuration management database (CMDB) for your IT assets, you can easily pinpoint when a problem happens. With regulations like GDPR, this becomes more important as you are legally required to report your security breaches.
Hardware asset management and software asset management tools keep historical records or logs of various information. This information is a great resource to recognize irregularities or anomalies. This data can help your business early detect cyber attacks and take preventive measures.
Data is the most valuable resource for businesses in the information age. Your ITAM solution gives you the ability to organize and align the data from your employees, your customers, and your infrastructure. So you’ll have more control. It’s an important tool for tracking and securing data.
Cybersecurity is expensive. Most companies stop tracking their hardware or updating their software due to the associated costs. Initially, an IT inventory management solution might take resources to set up. But it will save you time and money in the long-run. It will make tracking and updating hardware and software assets easier and more efficient.
No solution can stop all cyber attacks. But an ITAM solution can help your organisation build the necessary security strategies to improve your chances of preventing an attack. And a robust ITAM solution can help your business stay safer.
"*" indicates required fields
Software Asset Management is a business practice that involves managing and optimising the life cycle of software within an organisation.
Software asset management is relevant to many facets of a business - take a look at some of the roles that it can form part of the focus of.
Software vendors come in all shape and sizes - all with their own set of licensing models and rules. We take a look at just a few of them.
As a constantly evolving subject, SAM is not without its challenges. We take a look at some of the most common ones.
Wondering what an investment in SAM could do for your business? Fill out a few details and find out what return you could get!
Answer a few questions about your SAM infrastructure & experience, and we'll put together a personalised recommendation for the future.
A simple health check of what's being used across your Office 365 estate in this FREE, Microsoft backed and easy to setup review.
Just like you would with your vehicle each year, get an annual check up of your software asset management programme.
Overwhelmed by the task of documenting the steps for a successful SAM programme? Get the experts in to help!
Concerned your SAM tools aren't covering your whole estate? Or on the look out for an entirely new tool? Get us in to assist.
Not content with covering all things SAM related, we've teamed up with Capital to provide a comprehensive hardware asset management review.
A simple, one-time reconciliation of the software you have deployed versus the licence entitlement you own.
A regularly scheduled analysis of your organisation's estate, specifically adapted to your needs and budget.
A full appraisal of your Microsoft 365 setup and how best to optimise it through automated recommendations.
An add-on to our SAMplicity One, MOT and Plus offerings, quickly diagnose your ability to migrate your resources to the cloud.
In collaboration with law firm Addleshaw Goddard, ensure the legality of your SAM programme and get assistance with any contract disputes.
Available as standard with SAMplicity Plus, ensure you're compliant if you're unexpectedly audited by a vendor.
We've teamed up with some of the forefront experts in licensing knowledge so you can teach yourself to be an expert too.
Stumped by the continually evolving complexities of SAM? Join us for one of our comprehensive courses, either in-person or online.
It’s chock full of useful advice, exclusive events and interesting articles. Don’t miss out!