Rise in rogue IT threatens file security
Sep 30, 2014
More organizations are incorporating bring-your-own-device policies to streamline their processes and reap the benefits. However, with the increasing consumerization of advanced computing methods, rogue IT is on the rise among workers. This includes the fact that more employees are using consumer file sharing solutions rather than applications provided by the company. While these practices may seem more advantageous to the workers using their own programs, it can actually introduce substantial security vulnerabilities that threaten corporate information.
With the emergence of new hardware on a regular basis, it should come as no surprise that people want to use these devices for both their personal and work tasks. Numerous studies have shown that even if a business bans certain equipment from being used, employees will likely find a way to incorporate the devices anyway. InformationWeek contributor David Fowler noted that the costs of disruptive technologies could outweigh the short-term benefits when used without IT’s permission. This type of situation will often force IT professionals to add the necessary security measures and recover any compromised information. However, users often choose to use various systems due to the speed they can provide. Many technologies like the cloud and online file sharing streamline processes, but organizations need to approach these solutions on their own terms.
“When a business unit gets its hands on a new technology it can use to accelerate operations, that tech will spread like water finding the path of least resistance,” Fowler wrote. “When faced with the tradeoff between waiting for normal policies and controls to be put in place (the brakes) or the business moving fast to compete more effectively (the gas), speed wins.”
Consumerization changing business approach to technology
People are becoming more knowledgeable about the systems they use on a daily basis due in large part to the prevalence of personal smartphones and other similar computing devices. The consumerization of IT has brought many business-like processes to the public, and now, workers are looking to bring their preferred systems into the enterprise. Midsize Insider noted that the prevalence of malware targeting mobile hardware has caused many organizations to pause their mobile efforts, with some opting to have their employees pick from a range of approved devices rather than bring their personal equipment.
Many companies are enforcing a similar process with applications, allowing staff members to only use pre-approved programs. Malware is becoming more sophisticated, and with rogue IT growing, it will be integral to enforce security measures like mobile access control throughout the business. This will help ensure that sensitive documents are safe while ensuring that unapproved parties are denied entrance to company platforms.
“The likelihood that a mobile device will be part of any security incident is not insignificant, which is yet another key reason why many midsize companies leverage the depth of the managed services provider’s bench strength and experience,” Midsize Insider noted. “Regardless of the path a firm takes, be it BYOD or CYOD, as a solution to the continued consumerization of IT, the need to ensure that security processes and policies actually reduce risk is paramount.”