The key to a mobile workforce that mitigates the risk of cyber-threats
is integrating a secure digital workspace with three
important attributes. First, it is unified – it has a single win-dow
through which IT can configure, monitor and manage the
entire technology infrastructure. Second, it is contextual – it uses
machine learning and AI to fit each worker’s patterns and excep-tions
in order to deliver a personalized experience that reflects the
unique work device, location and network connection. Finally, it is
secure – it has a software-defined perimeter that grants safe access
and full visibility across the network and user ecosystem.
A secure digital workspace with these attributes fills the gap
between security policies and flexible work that many organiza-tions
are facing today. It is better suited to the work environments
that most employees encounter on a day-to-day basis and can be
customized based on job function, seniority level or department,
rather than a “one-size-fits-all” security solution.
One important way digital leaders are adapting to the demands
of the mobile workforce is by implementing a BYOD (bring your
own device) policy. With BYOD, companies can use desktop vir-tualization
so employees can access their work desktop on their
personal mobile devices. Employees can access information when
and where they choose, and employers can control the secure deliv-ery
of that information. This satisfies the needs of IT as well, who
can keep work apps and data in a centralized data centre, and can
monitor, detect and fix any problems to avoid a data loss or breach.
Another key component to keeping convenience and security
on the same side is to prioritize the user experience. In some sit-uations,
if employees feel the workplace software or device is too
complex or consumes too much time, they will opt for their own,
often unsecured technology. And if IT managers want employees
to be responsible about their data security, it is important that
employees understand and accept the technology at hand. IT must
be focused on a seamless experience that accommodates employ-ees
and employers.
Lastly, the secure digital workspace must be implemented in
conjunction with the right processes, training and education pro-grams.
This is especially relevant considering Citrix Canada’s
survey found three-in-10 are not aware of the security proto-cols
their company has in place. Although it is not necessary for
employees to understand all the ins and outs of how they are being
secured, HR must continuously develop and communicate secu-rity
policies to help employees understand why the policies exist
and why buy-in is crucial.
To have all employees buy-in to the security strategy requires
not just education, but a culture shift in which security is
instilled as a company’s core value. HR must work with C-suite
executives to enforce security policies across all levels and engage
all C-suite in the discussion on cybersecurity. Practices upheld
and importance placed on security at the top will trickle down,
and employees will be more likely to hold themselves account-able
and encourage others to do so as well. When employees
understand the risks of bypassing security protocols, and their
company provides a seamless user experience, breaches are less
likely to occur.
The key elements employers and employees are looking for –
productivity, flexibility, security – are attainable, but companies
must put in the effort to establish the right technology, policies
and culture if they wish to see all three realized simultaneously. n
Ching Mac is the director for Citrix Canada.
security
rawpixel / 123RF Stock Photo
WITH THE RIGHT
TECHNOLOGIES AND
POLICIES, SECURITY
CAN BE CONVENIENT,
AND CONVENIENCE
CAN BE SECURE.
42 ❚ AUGUST 2018 ❚ HR PROFESSIONAL
/profile_rawpixel