Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense.

As per BT.com’s infograph nearly half the concerns about BYOD security includes giving out unauthorized security information, using an unsecure device, and even theft of devices.

workplace-security

(Image Source: Shutterstock)

BYOD’s are the biggest concern; however, a company’s most fragile security spot begins with its employees. More specifically, human errors with such things as utilizing unsecure devices, staying logged in even when not working and being too trusting with fellow employees with regards to logon credentials etc, are most certainly how many everyday breaches occur. Even the best precautions and encryptions can be weakened by staff logging on and accessing company data from off-site and sometimes even unsecure devices, as well as having easily guessed passwords and erratic online work behaviors.

There are many ways to reduce such security weaknesses, but some say that everyone is at risk. According to an infograph by Solera Networks, online users have a 69% chance of being a preyed upon. And while 25% of incidents occur while users are online, there are many ways, Solera shows, for users to be security safe including logging out once a user is finished and having passwords that are lengthy and include special characters and uppercase as well as lowercase letters.

With user slips being all too common, it is no wonder that the larger number of staff a company has the more difficult it can be to secure the workspace. That is why security companies have stepped up their methods to include such things as tracking user behavior and even red-flagging erratic usage.

Security Advice For Enhanced Security In Every Workspace

  • Advise employees not to give out information that is not theirs to give out, instead direct individuals to the appropriate company resource in order for complete authentication.
  • Run frequent penetration or pen tests, including social engineering tests, so that users are constantly on the lookout for unauthorized access and therefore more security aware.
  • Have an easy to understand, documented security policy, as well as seminars on how to more security conscious may drastically enhance corporate security. As BT.com shows us in their infograph, only 66% of staff members are aware of company security policy.

Please comment on some of the areas that you feel can be improved in workplace security.

By Glenn Blake

Follow Us

Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.
Follow Us
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Popular

Top Viral Impact

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting

Cloud Infographic: Cloud Computing Growth

Cloud Infographic: Cloud Computing Growth

An excellent infographic provided by AwesomeCloud which predicts a continued high level of growth in the cloud computing industry. Potentially staggering numbers for Public Cloud IT Services of $100 Billion by 2016. Infographic Source: AwesomeCloud About Latest Posts Follow UsGlenn BlakeGlenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving

Hewlett-Packard Company On-Demand Webinar

Hewlett-Packard Company On-Demand Webinar

Shifting Workloads and the Server Evolution Learn more about the latest industry trends and the challenges customers are talking about. Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and