Mobility and Social Media: Embrace and Respond
EUC with HCI: Why It Matters
Embrace and respond to mobility, social media trends
It will behoove you and your organization to recognize that mobility and social media are here to stay. Instead of banning mobile devices and social networking sites at work, you can mitigate the risks by simultaneously taking steps to safeguard your company's most critical access points and information assets, while creating a culture of risk awareness and compliance. The first step is to identify the key access points that must be secured. These will most likely be associated with access to primary information assets such as intellectual property, customer lists or corporate email traffic. Once these are identified, you can implement a data leakage prevention program. On the process front, your organization should make a distinction between what is available on mobile devices versus what can be accessed from a secure location. The right people should be permitted to obtain the data they need where and when they need it without unnecessarily exposing themselves to any data risk.
Next, access to sensitive data, mobile or otherwise, should be restricted on a "need to access" basis. You'll want to establish protocols requiring that data stewards be notified of access to critical data. In terms of your people, those with access to sensitive information should be well briefed about the reasons data security is essential, as well as educated about the basics, such as safeguarding and regularly updating passwords. Implement processes to develop awareness and ensure compliance with security requirements.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...