Skip to main content

See also:

Primary Security Concerns for Businesses in 2014

Security Concerns for Businesses in 2014
Security Concerns for Businesses in 2014
123rf.com

In addition to the now well-publicized concerns that BYOD has generated for CIO’s, they will also be focusing on better security for offshoots like BYOI (Bring Your Own Identity) and BYOC (Bring Your Own Cloud). IT budgets continue to be disproportionately not up to the task at hand, when it comes to the demands for greater mobile security. Getting everyone on board with proper security protocol for BYOD and cloud-based access, will be Job One for CIOs. (Source: http://www.itbusinessedge.com/slideshows/top-security-priorities-for-cios-in-2014.html)

Changes in BYOD assessment

Beyond support, interoperability, CIOs will need to address software licensing issues, in order to mitigate potential software licensing liability. Also, managing employee access to business services via their own third-party identities can incur new licensing issues. Does this add to or decrease workload, overhead, and liability/risk profile? are questions that CIOs will be addressing more.

CIOs will eliminate consumer-based file sync and share solutions in the workplace.

Consumer-grade sync and share solutions, highly popular with employees due to their familiarity, present unnecessary vulnerabilities into environments that IT departments have painstakingly worked to secure. As a result, CIOs will begin fazing them out (particularly in the case of external collaborations) and replacing them with enterprise-grade solutions that give them the control and security they need without slowing employees down.

The new balancing act: government compliance versus civil liberties

CIOs are not exempt from the ethical debate waging regarding corporate sharing of employee and customer data with government organizations. Countries are issuing laws that insist that customer data must be kept within that customer’s country of residence.

On-premise email solutions

“The Cloud” was so-over hyped it couldn’t help but burst and what has hit the ground in the fallout is that what goes up in the cloud, may come down in a location its originators didn’t intend. For organizations with strict compliance requirements dependence on it for email has been muy malo. Study after study show that malware-invested email has been one of the most effective ways for hackers to breach a company’s firewall. For this reason CIOs are moving to a safer option and opting for on-premise email solutions (Source: http://www.winmagic.com/products/full-disk-encryption-for-windows).