Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 27 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Giving millennials the keys to a kingdom without borders

by The Gurus
March 30, 2017
in Opinions & Analysis
IoT map
Share on FacebookShare on Twitter

From mobile phones to WiFi door locks and ingestible smart pills, connected devices that make up the Internet of Things are entering our offices, home, and even bodies at an astonishing rate. Such devices were once a distant figment of our imagination or something only dreamt up in a Sci-Fi film, but we’re quickly becoming dependent on them to track our exercise, unlock our homes, or diagnose our illnesses.
IoT has added momentum to the consumerisation of IT, meaning employees now expect the workplace to be just as connected as their homes. In turn, remote work environments that offer more flexibility are not only expected but even demanded, expanding the business perimeter well beyond the four walls of the office.
Welcoming the millennial workforce
Adding to these challenges is the rise of the millennial workforce, which will comprise 75 per cent of the global workforce by 2025, according to Deloitte[1]. A generation of digital natives, with greater expectations for a modern mobile work environment, millennials don’t want to use clunky legacy IT and demand intuitive user experiences. Unless you comply, they’re likely to defect to competitors who can facilitate their anywhere, anytime, connected culture.
Mobile demands a security reset
To facilitate this demand, many organisations are adopting a ‘deskless’ policy, where employees are no longer tied to a single desk but are provided with the tools to work on the go. This is why Bring Your Own Device (BYOD) dominates how companies provide mobile access to apps. But to ensure digital devices are covered under the protective corporate umbrella, organisations must extend their security measures to wherever their employees are – whether that’s a coffee shop at an airport or the morning train commute. Here are some suggestions for how to do that:
Don’t use legacy directories
Microsoft Active Directory is a popular software system to control access to corporate apps. First released in the 90s, it was designed for very different world than today:

  1. Employees only worked in an office — not remotely
  2. Employees on worked on PCs — not iPhones, Android devices, or Macs
  3. Employees were the only users given access to Active Directory (AD) — not other types of users such as contractors, franchisees, brokers, or other non-employee workers that comprise today’s agile workforce

 
Because of these factors, AD simply doesn’t work well today’s needs: non-employee users accessing company apps from non-PC devices outside the corporate firewall. Companies should instead use a cloud directory engineered to be secure on the Internet, without the crutch of a firewall, accessible by a wide range of user types and devices.
Don’t rely on passwords
With over one billion credentials hacked[2], passwords are simply not enough to secure corporate apps. Multifactor authentication (MFA), where you use your phone to sign into an app, is now table stakes for keeping your company secure. But having to reach for your phone every time you sign into an app gets tedious, fast. So look for dynamic MFA, which only requires you to sign in when working remotely, which can install a certificate on your laptop as a second factor to enable painless MFA, and which works whatever authenticators are preferred by your security team, such as those from Google, DUO, RSA, and others.
Don’t harm employees with MDM-zilla
Traditional Mobile Device Management (MDM) vendors brag about their ability to wipe all data from a mobile device. This would be fine if it were 2007 and we were all using company-issued Blackberries that only have company email. But — like Active Directory — MDM is designed for bygone era. Imagine if an IT admin used an MDM “solution” to accidentally wipe your personal device when travelling: you wouldn’t be able to contact anyone, you wouldn’t know when your meetings are, and you wouldn’t even have your airline boarding pass! Better solutions that protect personal data and apps from IT admins are coming; be sure to look for them.
Facilitating the needs of the modern mobile workforce will be more important than ever in 2017. It will be vital for companies to turn concerns and demands into actions. It is only a matter of time before skilled tech-savvy workers demand to work with more technologically progressive employers.
[1] https://www2.deloitte.com/global/en/pages/about-deloitte/articles/millennialsurvey.html
[2] http://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=1
By Al Sargent, Sr. Director of Product Marketing at OneLogin

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweet
Previous Post

Misguided justifications for not remediating vulnerabilities

Next Post

93% of cybersecurity researchers say non-malware attacks pose more risk to businesses than commodity malware

Recent News

CREST and IASME announce partnership with the NCSC to deliver Cyber Incident Exercising scheme

September 26, 2023
partnership

Cyberelements Partners with ABC Distribution Partners to Revolutionise Privileged Access Management in Europe

September 26, 2023
Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

September 25, 2023
Nurturing Our Cyber Talent

Nurturing Our Cyber Talent

September 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information