Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense.

As per BT.com’s infograph nearly half the concerns about BYOD security includes giving out unauthorized security information, using an unsecure device, and even theft of devices.

workplace-security

(Image Source: Shutterstock)

BYOD’s are the biggest concern; however, a company’s most fragile security spot begins with its employees. More specifically, human errors with such things as utilizing unsecure devices, staying logged in even when not working and being too trusting with fellow employees with regards to logon credentials etc, are most certainly how many everyday breaches occur. Even the best precautions and encryptions can be weakened by staff logging on and accessing company data from off-site and sometimes even unsecure devices, as well as having easily guessed passwords and erratic online work behaviors.

There are many ways to reduce such security weaknesses, but some say that everyone is at risk. According to an infograph by Solera Networks, online users have a 69% chance of being a preyed upon. And while 25% of incidents occur while users are online, there are many ways, Solera shows, for users to be security safe including logging out once a user is finished and having passwords that are lengthy and include special characters and uppercase as well as lowercase letters.

With user slips being all too common, it is no wonder that the larger number of staff a company has the more difficult it can be to secure the workspace. That is why security companies have stepped up their methods to include such things as tracking user behavior and even red-flagging erratic usage.

Security Advice For Enhanced Security In Every Workspace

  • Advise employees not to give out information that is not theirs to give out, instead direct individuals to the appropriate company resource in order for complete authentication.
  • Run frequent penetration or pen tests, including social engineering tests, so that users are constantly on the lookout for unauthorized access and therefore more security aware.
  • Have an easy to understand, documented security policy, as well as seminars on how to more security conscious may drastically enhance corporate security. As BT.com shows us in their infograph, only 66% of staff members are aware of company security policy.

Please comment on some of the areas that you feel can be improved in workplace security.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…