However, with great flexibility comes great responsibility?? and a massively increased cyber security risk. With this in mind, the following tips highlight how businesses in 2017 can mitigate the risk associated with a?mobile workforce. 1) Integrate your IDaaS with HR With organisations of all sizes increasingly turning to cloud-based technologies, incorporating an authentication infrastructure has become imperative to managing the vast number of employees accessing corporate documents, no matter where they are. Businesses using Identity-as-a-Service (IDaaS) can provide staff?with methods such as Single Sign On (SSO) to log into and work on a multitude of corporate applications without having to continuously enter credentials. In practice, this is an important tool to facilitate the mobile workforce. However, if an employee?s user credentials aren?t deactivated promptly after leaving the company (with research suggesting this is 13 per cent of the time) security is left open. We like to think most former employees won?t exploit this access to corporate systems, but it only takes one disgruntled ex-employee to cause a breach. In the next year, human resources (HR) will place a high importance upon IDaaS to ultimately simplify the on-boarding and off-boarding process, closing a door that was previously wide-open for cyber criminals and disgruntled ex-employees to exploit. 2) Extend security to the virtual office Employees are no longer bound to the office and are choosing to work from disparate locations, extending the corporate perimeter to a radius that covers the whole planet, regardless of business size. This surpasses the physical and cyber perimeters of your office, thus requiring a multitude of mobile endpoints to be unified and protected under a unified device management strategy. With the technological evolution showing no signs of abating, organisations must extend perimeter defences in 2017 to protect the mobile workforce?by enrolling laptops and portable devices into cloud directories. No matter where employees are based, cybersecurity should be given equal weighting and the virtual office must be treated the same as the traditional HQ. 3) Protect your business from external threats The issue of security has increasingly become a problem for the entire C-suite. High-profile cases in the UK, such as the recent ?Three? hack, which saw 133,827 customer accounts compromised, have highlighted the dangers of insufficient threat detection to protect customer data. It can be tempting to put all sensitive data on lock down, but that?s simply not practical or good practise for promoting a healthy work culture or an efficient workforce. To mitigate such risks, organisations of all sizes must have perimeter threat detection in place to detect and mitigate the dangers. To conclude, the rapid influx of mobile devices into the modern enterprise has thrust issues such as bring-your-own-device (BYOD) and shadow IT into the spotlight and by now, the majority of CEOs have figured they are here to stay. If they haven?t, then 2017 will bring with it a major wake up call. In order to tackle threat detection and wider security strategies head-on in 2017, organisations need to be proactive, rather than reactive. By doing so, anomalies on user profiles and mobile applications can be detected at a much faster rate. Al Sargent is senior director of product marketing at OneLoginImage:Shutterstock
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.