Story image

Businesses face new security challenges

01 Jan 2011

Consumer-powered IT is rapidly blurring the distinction between home and workplace, and creating new security headaches for businesses.A recent study, sponsored by Unisys, says a "fourth wave” of productivity is being driven by workers who are constantly connected, and expect to move seamlessly between their home and work environments, ideally using the same devices.But the study exposes a troubling gap between the activities and expectations of new generations of ‘iWorkers’ and their employers’ readiness to manage, secure, and support this movement – and capitalise on it, boosting productivity with new ways of connecting and sharing, staying competitive as an innovative company and workplace, and delivering IT flexibly while managing security.Organisations, the study says, are still largely operating in the standardised, command-and-control IT models of the past. Those models are very good at managing risks and costs, but they prevent the typical organisation from harnessing the full power of this new wave of productivity.Among the solutions suggested:Increased focus on consumer device security policy – Such policy changes will likely focus on authenticating the identities of device users and encrypting data as it traverses the network.Biometric enablement of mobile devices – Unisys expects biometrics such as facial image or voice verification to be increasingly used in 2011 to verify the identities of mobile device users, in addition to the more traditional user ID or password. Business continuity planning as a defence against cyber attacks – With dependence on internet communication continuing to grow, Unisys expects businesses to invest more in alternative paths such as automatic re-routing of communications from voice-over-IP to cellular or satellite for critical communications in the event of an internet outage.Location-based security – In 2011 Unisys predicts that organisations will begin to exploit location-based technologies such as global positioning systems as a means of securing employee access to sensitive business data and systems, as well as tracking staff who are mostly on the road during work hours.

Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Commission warns Spark for misleading in-contract customers
The warning follows an investigation into representations Spark made on its website and in emails in August and September 2018.
Qualtrics aims to help organisations master experience management
Experience Basecamp helps users master XM products, including CustomerXM, EmployeeXM and Research Core.
Cloud innovation driving NZ IT services market, says IDC
Managed services makes up the largest portion of total IT services revenue. However, the project-oriented market achieved the highest YoY growth.
Kiwi software company aims to improve global customer experience
Plexure has developed an intelligent technology platform that powers mobile marketing.
Hands-on review: Playing the long game with the The iPhone XR
The red XR is a rare case of having a phone that’s ‘too pretty to be covered’ - and it’s not hard to see why.
What the future of fibre looks like in NZ
The Commerce Commission has released its emerging views paper on the rules, requirements and processes which will underpin the new regulatory regime for New Zealand’s fibre networks.
Gen Z confidence in the economy is on the decline
Businesses need to work hard to improve their reputations.