Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense.

As per BT.com’s infograph nearly half the concerns about BYOD security includes giving out unauthorized security information, using an unsecure device, and even theft of devices.

workplace-security

(Image Source: Shutterstock)

BYOD’s are the biggest concern; however, a company’s most fragile security spot begins with its employees. More specifically, human errors with such things as utilizing unsecure devices, staying logged in even when not working and being too trusting with fellow employees with regards to logon credentials etc, are most certainly how many everyday breaches occur. Even the best precautions and encryptions can be weakened by staff logging on and accessing company data from off-site and sometimes even unsecure devices, as well as having easily guessed passwords and erratic online work behaviors.

There are many ways to reduce such security weaknesses, but some say that everyone is at risk. According to an infograph by Solera Networks, online users have a 69% chance of being a preyed upon. And while 25% of incidents occur while users are online, there are many ways, Solera shows, for users to be security safe including logging out once a user is finished and having passwords that are lengthy and include special characters and uppercase as well as lowercase letters.

With user slips being all too common, it is no wonder that the larger number of staff a company has the more difficult it can be to secure the workspace. That is why security companies have stepped up their methods to include such things as tracking user behavior and even red-flagging erratic usage.

Security Advice For Enhanced Security In Every Workspace

  • Advise employees not to give out information that is not theirs to give out, instead direct individuals to the appropriate company resource in order for complete authentication.
  • Run frequent penetration or pen tests, including social engineering tests, so that users are constantly on the lookout for unauthorized access and therefore more security aware.
  • Have an easy to understand, documented security policy, as well as seminars on how to more security conscious may drastically enhance corporate security. As BT.com shows us in their infograph, only 66% of staff members are aware of company security policy.

Please comment on some of the areas that you feel can be improved in workplace security.

By Glenn Blake

Follow Us

Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.
Follow Us

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

Virtual reality movies are coming

Virtual reality movies are coming

In a decade or two, going to the movie theater could feel as outdated as renting a VHS tape. That’s the future virtual reality enthusiasts from Oculus VR and elsewhere are sketching out, extolling the … Read the source article at Yahoo Finance About Latest Posts Follow UsGlenn BlakeGlenn Blake is a writer for CloudTweaks and

Amazon Earnings: What to Watch

Amazon Earnings: What to Watch

Amazon Earnings Amazon.com is scheduled to report third-quarter financial results after regular trading hours Thursday. Here’s what you need to know:  Read the source article at WSJ Blogs About Latest Posts Follow UsGlenn BlakeGlenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years. Follow UsLatest posts by

Hitachi Data Systems Launches New Public Safety and Smart City Solutions

Hitachi Data Systems Launches New Public Safety and Smart City Solutions

Smart City Solutions ORLANDO, FL–(Marketwired – Oct 23, 2014) – Hitachi Data Systems Corporation, a wholly owned subsidiary of Hitachi, Ltd. (TSE: 6501), today announced Hitachi Visualization, public safety solutions that foster safer, smarter, more efficient communities through connected intelligence. Read the source article at Yahoo Finance Add The CloudBuzz XML Feed To Receive News Updates