This post is sponsored by Samsung. All thoughts and opinions are my own.
Data security has never been as difficult as it is today. And it will become more difficult. Why? Because it is deeply embedded in everything we do; and because we, not technology, hold the key to the future.
The protective walls of the corporation have long collapsed. This is not about erosion – they are gone. Target, Wendy’s, PlaystationAll have lost large customer data. Utilities, Bank, public organizations has been compromised, and will continue to do so.
Not only are a significant number of computer systems connected, or indeed, running from the internet, but the way we access corporate data is unrecognizable fragmented. Over the past decade, mobile devices has gone from special to ordinary. And millions of potentially unsafe devices are currently connected, in trick of the Internet of Things.
So, is it all lost? Unnecessary. There’s still room for a robust security architecture, built on the principle of ‘segregating concerns’ – that is, limit risk by considering how and where business data is located. should circulate and put in place the appropriate protective measures. Indeed, I wrote one book about it.
We can talk about technical features and governance mechanisms built into such an architecture, so that it is good and consistent. But data security would never function without the most important, but least predictable, variable of the human trio, process and technology – people.
In tech parlance, the term ‘consumption’ has been used to describe our growing tendency to use our own technology in the workplace. But the principle goes much deeper. For example, consider how people expect to bring their phone numbers with them when they switch companies.
In general, employees will follow the rules, especially if their contract says they must do so. An accepted usage policy is a useful tool against direct misuse of computer systems, software and services. But you don’t have to be a behavioral psychologist to know that people hate being told what to do if it seems pointless or real, counterproductive.
This goes right to the top. Gone are the days when senior executives expected their emails to be printed for them so they could command a response. Today, they have as high-tech capabilities as the rest of us and desire to make full use of what’s available – even if that means using their own equipment, due to awareness. the company’s IT inadequacies.
Got an answer? Yes, yes, but it does require a way of looking beyond the present environment and towards the workplace, and the workforce, of the future. Not only did people become more tech-savvy, they also became more rapidly. Companies hire less and subcontract more. Where it used to be, today they collaborate. And offices are replacing cubes with collaborative space.
This brave new world of work is built on a spirit of trust and collaboration, with smarter organizations attracting the most stakeholders – co-creating with customers, suppliers, and even more. even competitors. While this approach puts people first, it requires boundaries to be set and enforced – without hindering.
Agility is key to the future, in data security as well as in business. For security to be successful in such a flexible environment, it needs to consider the role of data as a driver of collaboration, as well as providing significantly simpler service delivery mechanisms. compared with present.
If you create a hindering environment, instead of helping people meet the needs of your business, you will increase, not decrease, strategic business risk. While this creates a dilemma for any security professional, that doesn’t get it wrong. As organizations evolve over the next decade, we will see this point proven over and over again.