security
or between apps. This is because with web apps, hackers are
connected to databases of sensitive customer and business in-formation.
And, similar to networks, this can be risky because
employees may access these apps from within and outside cor-porate
networks.
One solution is app virtualization, in which apps are stored in
a data centre or cloud, making the infrastructure more secure be-cause
there is no transfer of data. With a centralized system, it is
less work for IT departments because they can perform patches,
updates and other fixes in one sweep. And, even if a device gets
hacked or breached, the company data is secure because it’s all
stored in the secured data center and not on the device itself.
DATA SECURITY: PROTECTING COMPANY VALUE
Company data, which can range from marketing and sales infor-mation,
contracts or business strategies, is at the core of a company
– it’s what informs its unique value. It must therefore be close-ly
protected. In recent cyberattacks, personal information held in
corporate data repositories has had grave consequences.
Similar to the methods for protecting against app breach-es,
to lessen the threat of data breaches companies can move to
virtualized environments where company data lives in secured,
centralized containers that are separate from personal data. Then,
IT can block users from taking risks with company data by, for ex-ample,
opening an email attachment in an app not approved by
the company. This is essential in an age of BYOD (bring your own
device) when work apps live alongside and can intertwine with
personal apps. Secondly, companies can enforce secure file sharing
between employees that has security built into it through proper
authentication, authorization and encryption.
ANALYTICS AND INSIGHTS: FOLLOW THE DATA
Enforcing a security strategy is not “plug and play” but some-thing
that requires constant upkeep. Maintaining compliance and
preventing breaches is near impossible without monitoring and
detection, even in the most secure spaces.
By using real-time analytics and data, IT can detect attacks and
breaches to assist, identify and address application performance
and security issues across the network. Companies can also con-duct
regular auditing and accounting of user access, configuration
chances and account management to stay on guard for attacks and
compromises. This can include irregular locations, activity or large
amounts of data transfer.
These key tenets to security strip away the “one size fits all”
thinking of the past – such as a routine security briefing during
an onboarding process. Rather, by applying this diverse, contex-tual
approach to keeping employees happy and organizational
information safe, leaders can take the first steps to marrying con-venience
with security. n
Michael Murphy is vice-president and country manager of business
mobility software company Citrix Canada.
IN RECENT CYBERATTACKS, PERSONAL
INFORMATION HELD IN CORPORATE
DATA REPOSITORIES HAS HAD
GRAVE CONSEQUENCES.
vs148 / Shutterstock.com
HRPROFESSIONALNOW.CA ❚ DECEMBER 2017 ❚ 33
/HRPROFESSIONALNOW.CA