Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s Talk Workspace Cloud Security!

Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense.

As per BT.com’s infograph nearly half the concerns about BYOD security includes giving out unauthorized security information, using an unsecure device, and even theft of devices.

workplace-security

(Image Source: Shutterstock)

BYOD’s are the biggest concern; however, a company’s most fragile security spot begins with its employees. More specifically, human errors with such things as utilizing unsecure devices, staying logged in even when not working and being too trusting with fellow employees with regards to logon credentials etc, are most certainly how many everyday breaches occur. Even the best precautions and encryptions can be weakened by staff logging on and accessing company data from off-site and sometimes even unsecure devices, as well as having easily guessed passwords and erratic online work behaviors.

There are many ways to reduce such security weaknesses, but some say that everyone is at risk. According to an infograph by Solera Networks, online users have a 69% chance of being a preyed upon. And while 25% of incidents occur while users are online, there are many ways, Solera shows, for users to be security safe including logging out once a user is finished and having passwords that are lengthy and include special characters and uppercase as well as lowercase letters.

With user slips being all too common, it is no wonder that the larger number of staff a company has the more difficult it can be to secure the workspace. That is why security companies have stepped up their methods to include such things as tracking user behavior and even red-flagging erratic usage.

Security Advice For Enhanced Security In Every Workspace

  • Advise employees not to give out information that is not theirs to give out, instead direct individuals to the appropriate company resource in order for complete authentication.
  • Run frequent penetration or pen tests, including social engineering tests, so that users are constantly on the lookout for unauthorized access and therefore more security aware.
  • Have an easy to understand, documented security policy, as well as seminars on how to more security conscious may drastically enhance corporate security. As BT.com shows us in their infograph, only 66% of staff members are aware of company security policy.

Please comment on some of the areas that you feel can be improved in workplace security.

By Glenn Blake

Follow Us

Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.
Follow Us

Sorry, comments are closed for this post.


CloudTweaks Sponsors - Find out more!

Popular

Top Viral Impact

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,…

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which goes into further detail.…

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends For nearly every business, the concept of business intelligence is nothing new. Ambitious organizations have been searching for any type of data-driven advantage for some time now – perhaps for as long as they’ve existed. However, the historical use of competitive intelligence pales in comparison to the…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…



Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter