The findings item a analyzable information balancing enactment betwixt IT teams and users; particularly successful the property of distant enactment and virtual collaboration astatine scale.
Last month, cybersecurity institution Hysolate published a study astir the "Enterprise Security Paradox," highlighting challenges associated with enabling IT freedoms portion ensuring choky information procedures. The findings item a analyzable balancing enactment betwixt IT teams and web users. Calibrating this equilibrium is peculiarly challenging successful the property of distant enactment arsenic employees log connected and virtually collaborate via a big of integer solutions.
"COVID-19 has exacerbated things importantly due to the fact that the request to collaborate remotely has importantly increased. The emblematic collaboration tools (shared documents, video conferencing, chat, etc.) are often blocked by firm IT restrictions, which is hampering specified collaboration," said Marc Gaffan, CEO astatine Hysolate.
SEE: Security incidental effect policy (TechRepublic Premium)
Balancing information and idiosyncratic acquisition
Overall, the Hysolate survey recovered that virtually each employees (93%) "are moving astir IT restrictions," and a specified 7% said they were "satisfied with their firm IT restrictions." Interestingly, this accusation astir IT workarounds does not lucifer information leaders' and IT expectations. For example, information leaders believed 43% of users are "in astir cases moving astir IT restrictions" and IT respondents believed 23% of users are moving "around IT restrictions astir of the time," per the report.
One of the main factors down employees moving astir IT teams is related to firm policies blocking entree to peculiar websites, Gaffan said.
"Most of these websites are perfectly morganatic and required to bash their jobs but are inactive prohibited owed to firm restrictions," helium continued.
"Additional factors down these workarounds see "external collaboration with 3rd parties that are morganatic concern partners but owed to firm restrictions employees cannot stock files oregon usage different online collaboration tools," Gaffan explained.
SEE: How to negociate passwords: Best practices and information tips (free PDF) (TechRepublic)
As portion of their enactment duties, 90% of employees "have required IT activities" that they would picture arsenic "risky," according to the report, with the apical situations including "installing unsanctioned" apps, "giving developers a sandbox environment" and "using endpoints for idiosyncratic activities."
Boosting IT freedoms
A information of the study focuses connected supporting users with accrued IT freedoms and the impacts of implementing these strategies. Virtually each respondents (87%) said they "are looking to summation worker IT freedom," and the apical affirmative impacts related to implementing these strategies see accrued worker productivity, accrued "employee sentiment [toward] IT policies" and decreased vexation among employees, per Hysolate.
"The drawbacks are typically related to information concerns," Gaffan said. "These concerns see some the risks of malware infiltrating firm systems that tin pb to information theft and ransomware attacks and besides the concerns of exfiltrating firm information that could incorporate delicate information."
To enactment much IT freedom, Gaffan said "companies tin usage assorted isolation technologies."
"This would let users to browse the web freely, instal applications and usage USB devices successful an isolated situation connected their PC without compromising firm security," helium continued.
Cybersecurity Insider Newsletter
Strengthen your organization's IT information defenses by keeping abreast of the latest cybersecurity news, solutions, and champion practices. Delivered Tuesdays and ThursdaysSign up today
- Employers are watching distant workers and they're monitoring these activities (TechRepublic)
- Security threats connected the horizon: What IT pro's request to cognize (free PDF) (TechRepublic)
- Checklist: Securing integer information (TechRepublic Premium)
- Online information 101: Tips for protecting your privateness from hackers and spies (ZDNet)
- Cybersecurity and cyberwar: More must-read coverage (TechRepublic connected Flipboard)