Risk – the answer to the transformative technology security nightmare

Risk – the answer to the transformative technology security nightmare

Risk – the answer to the transformative technology security nightmare
Chris Russell, CTO, Swivel Secure

They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see Bring Your Own Device (BYOD), Cloud and Internet of Things (IoT) initiatives as a gateway to a world of increased productivity and growth. But for IT and information security (IS) departments that same gateway leads somewhere quite different: to a networked environment littered with security vulnerabilities.

Gartner says that 38 percent of all IT spending is now happening outside the IT department, with the figure continuing to rise. And as the spending goes, so does the control. Without control of the technology, IT and IS lose visibility of any resulting security issues.

BYOD and Cloud users have already shown a propensity for poor security practice, with inadequate passwords, insufficient device control and monitoring and security measures that simply aren’t rigorous enough for the enterprise environment. Outsourcing adds problems too, with many CIOs uncertain about their ability to assess the security of their cloud providers.

IoT looks set to make matters even worse. Suddenly IS’s area of concern extends way outside the network perimeter, through sensors and gateways, potentially into to customers’ facilities and homes. For IoT to fulfil its promise, these new touch points must be easy to access, yet remain tamper resistant and tamper evident even though constantly connected.

Worrying? You bet. A lost cause? Absolutely not.

The answer lies in risk and in reintegrating the IT and IS departments back into transformative technology based developments within the enterprise. Swivel’s latest white paper ‘The IT Security Risk Assessment: The Elephant in the Boardroom’ explores this problem and how to resolve it, making the case for CEOs to release funding to prioritise the implementation of IT security risk assessments. The key point is this: without assessing the risks associated with this profound technological change, corporate IT teams will lack the insights they need to defend their sensitive corporate data as they embrace their organisation’s digital transformation.

There are unparalleled security challenges facing IT and IS departments as they seek to integrate the new with the old, without impacting the end-user experience or the performance of their systems. Only by reinventing how security risk assessments are performed, together with the adoption of risk based, adaptive, multi-factor authentication, can a bridge be built between IT, IS and other departments, that enables firms to strike an effective balance – or ‘identify appropriate levels of friction’ – between the adoption of protectionist and, in some cases, interventionist information security policies. Once these measures are in place, the adoption of enabling technologies capable of fostering innovation and improving business performance can proceed unhindered, confident in the knowledge the firm’s sensitive data is appropriately locked down.

Read the latest Swivel Secure whitepaper ‘The IT Security Risk Assessment: The Elephant in the Boardroom’ http://swivelsecure.com/adaptive-authentication/

[su_button url=”http://swivelsecure.com/” target=”blank” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on Swivel Secure click here[/su_button]

 

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…

ICT® Launches New TSL Access Reader Series

Integrated Control Technology (ICT®), a leading manufacturer of intelligent access control and…
Image Provided by Paxton

Paxton Partners with Skills for Security

The security technology manufacturer Paxton is proud to announce a partnership with Skills for Security…
Image Provided by ICT

ICT and Ingram Micro sign distribution agreement MEA

Integrated Control Technology (ICT), award-winning global manufacturer of intelligent electronic access control and security solutions..
Image Provided by Toshiba

Toshiba launches new HDD Innovation Lab

Toshiba Electronics Europe GmbH (Toshiba) has inaugurated a new HDD Innovation Laboratory (HDD Innovation Lab) at its site in Düsseldorf..
Image Provided by Verkada

Verkada Doubles Down on the Channel with Strategic New Hire

Verkada, a leader in cloud-based physical security, today announced the appointment of Micah Deriso as Head of Global Channel…
Image Provided by IPSA

IPSA Appoint Frontline Hero as Ambassador

Abdullah, the courageous security officer praised for foiling a horrific knife attack at Leicester Square, has been appointed as…
Image Provided by Codelocks

New Surface Latch from Codelocks

Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch…
Image provided by Genetec

Nicholas Smith to Lead Genetec UK and Ireland Operations

Genetec, provider of enterprise physical security software, announced the appointment of Nicholas Smith as its new Regional Sales Director…

News Desk

View all the latest, product, project and people news

News Desk

Click Here

Technology News

Keep up-to-date with the latest product innovation

Technology News

Click Here

Industry Sectors

Discover technology in action in all applications

Industry Sectors

Click Here

Enter The Awards

Showcase personal or organisation excellence

Advertise With Us

Reach decision makers and amplify your marketing

Advertise With Us

Click Here
Scroll to Top