Today News
A+ A A-

Network security in the era of the Millennials

One of the toughest gigs in IT is the job of keeping an organization’s network safe. It is also one that is getting tougher with the rise of the millennial generation.
Millennials — those in their 20s to mid-30s — are starting to dominate workplaces around the world. More than one-in-three workers in the US are millennials, a 2015 study by Pew Research Center found. And this demographic group will account for half of the global workforce by 2020, according to PwC.
The term “millennial” has many connotations. Among them: They like sharing on social media. They won’t put up with bad user experiences. They want a flexible approach to work. They move on quickly if their expectations are not being met. These characteristics will define the culture of the future workplace. They will also put the current network security regimes of many organizations to a stern test.
Here are three considerations.
• Social media
To block or not to block? Many organizations have probably considered this question when it comes to their employees’ use of social media in the workplace.
A study by HR software provider CareerBuilder, which polled employers from North America, found that 37 percent of employers see social media as one of the major productivity killers at the workplace, behind mobile phone and texting (55 percent), using the Internet (41 percent), and gossiping (39 percent). Three in four employers say two or more hours are lost a day in terms of productivity because employees are distracted.
From a network security perspective, social media is a vector for malware and socially engineered attacks. How many links that are shared innocently enough end up bringing users to compromised websites? And even if employees use social channels in a professional way, their friends and contacts are under no such obligation.
It is easy to ban or restrict social media sites at the network level. Static URL filters in Web filtering software can block or monitor specific URLs. The category-filtering feature can block entire groups of websites.
But that doesn’t mean CIOs should start blocking social networks at the workplace.
A better approach is to relook at how network security is being enforced holistically. Having a clear social media policy and training for staff is a good start. For instance, sales staff should be reminded of the security and business risks that might result from checking in their locations at customer sites via social channels like Facebook.
The most important safeguard though, is to have a robust, layered security infrastructure. It is a surer bet than having to rely on employees never erring in their clicks, taps, and swipes with their social media accounts.
• Know thy security layers
Layered security, whereby different layers of security controls combine to protect data, devices, and people, is widely adopted today. It ensures that when attacks occur at different sources, whether at the network, application, device, or user level, they can be detected and stopped before they spread. It also offers an effective safeguard against different types of threats.
With the changing workplace habits brought on by millennial workers, CIOs should relook at how they are setting up each layer of protection.
Consider, for instance, the use of personal devices in the workplace. According to a McKinsey & Company study, around 80 percent of enterprises now allow employees to use personal devices to connect to corporate networks. And increasingly, employees expect their IT departments to support their personal devices with access to corporate applications like email and calendar. This trend, termed BYOD (Bring Your Own Device), poses a number of new security threats.
In particular, CIOs should look at bolstering security at the device layer. The first step to take is to shore up the devices themselves through mandating some combination of firewalls, anti-malware software, MDM (mobile device management) solutions, and regular patching. A BYOD culture also puts organizations at risk from having their employees’ smart devices hacked because of poor passwords. Having policies and education on strong passwords are musts.
Similarly, defenses of the user layer should also be shored up to mitigate the rising risks of internal threats. This layer is often the trickiest to manage due to the need to balance security and convenience. You can also use a variety of authentication methods to identify network users and allow varying levels of access. Instilling awareness and educating staff are important steps to take.
• Tackle shadow IT
 Shadow IT is a term used to describe the use of applications and services, often cloud based, not sanctioned by the organization. Its uncontrolled nature poses a security threat and governance challenge.
Consider the scenario of employees using their smartphone to open a file. It is likely the phone will make a copy of the file, which could then be sent to an unapproved online storage destination when the phone performs its routine automatic backup. Just like that, your secure corporate data has been moved to an insecure location. Jeff Castillo, Country Manager, Fortinet Philippines

Leave a comment

Make sure you enter the (*) required information where indicated.Basic HTML code is allowed.

Commentaries

The judicial pot calling the kettle blac…

25-03-2017 Ninez Cacho-Olivares

The judicial pot calling the kettle black

That was strange for a Supreme Court spokesman to talk ...

In Trump land, painful choices await if …

25-03-2017 AFP and Tribune Wires

In Trump land, painful choices await if Obamacare goes

Rogersville, United States — Maribeth Coote says she ha...

Too many ways to skin an LP cat

24-03-2017 Ninez Cacho-Olivares

Too many ways to skin an LP cat

Rody, speaking before the Fiipino community in Thailand...

Muslims suffer year of discrimination af…

24-03-2017 AFP and Tribune Wires

Muslims suffer year of discrimination after Brussels bombs

Brussels, Belgium — Belgian teenager Ahmed is still ree...

Tough legal battle ahead for Leila

23-03-2017 Ninez Cacho-Olivares

Tough legal battle ahead for Leila

Filipinos will be very surprised if the Supreme Court (...

Brexit: The end of a loveless marriage

23-03-2017 AFP and Tribune Wires

Brexit: The end of a loveless marriage

London, United Kingdom — Britain’s relationship with th...

ETC

Headlines

Nation

Metro

Sports

Life Style

Etcetera

Motoring

business

Copyright 2000-2012 All rights reserved, The Daily Tribune Publishing Inc.