Generation Z and Cybersecurity: can businesses balance both?

Generation Z and cybersecurity: can businesses balance both?

A fundamental characteristic of a successful company is its ability to know what the future looks like. Whether through financial planning, transformation goals or long-term business strategy, it is essential to get a handle on the business challenges of tomorrow, as well as those of today.

But what about people? How well do businesses know the employees who will enter the workforce in the coming decade? What influences and motivates them? And what do they define as good technology? Unisys take a look…

Mainstream media demonstrates that the appetite for knowledge about Generation Z is growing. People want to get a handle on post-Millennials before they come to prominence, understanding their cultural preferences, consumer habits and prospects in the housing and job markets. Yet, for tech-dependent businesses, the most pressing concern about Generation Z is their relationship with IT and how it will impact upon the workplace.

Prospective Generation Z employees will not only be used to working with tech different to that used by the current workforce, but also be used to having an entirely different relationship with it. For example, recent research suggests that 84 per cent of the Generation Z population surveyed multitask, usually while watching online videos (for context, just 2 per cent of the working population today do the same). They use mobile and social by default, rather than adopting these technologies through trend or necessity. And they share sensitive information across a number of platforms, without a second thought.

To work effectively with Generation Z, businesses face the task of balancing two things. The first is creating workplace conditions that will appeal to the best and most innovative emerging business people. The second is ensuring that the new apps and devices that form part of those conditions do not compromise data and cybersecurity. The key for business will be to find a way to cater to each.

High expectations

Tech user demand is not necessarily new. As modern devices, apps and software enter the consumer space, employees will look for functionality similar to what they are using at work. But the contemporary workforce has come to the fore during an age of development for social media and online video. So they see these technologies as benefits, rather than expectations.

For Generation Z, the picture will be wildly different. The brightest minds born after 1996 will want to work for companies that are able to use modern tech as standard – and who encourage a professional approach to technology usage that mirrors the personal. While that doesn’t mean making Snapchat a business comms tool, it does mean identifying the benefits of social media and using them to create platforms that enable highly personal interaction and immediate-response data access.

It may be easy to dismiss or gloss over Gen Z tech desires. But the impact of that kind of thinking can be highly damaging, both in terms of business productivity and corporate profile. The unhappy truth is that businesses that fail to accommodate the tech needs of Gen Z will lose out on securing the best staff of 2020 and beyond.

High security

Even with a good understanding of Generation Z, many businesses will still find themselves asking which is the bigger priority: tech expectations or safety? Especially as the new tools Gen Z want to work with may not come with adequate security measures as standard; and that this new set of employees are used to finding work-arounds to tech problems, using video tutorials and crowd-sourced knowledge – which may present significant IT risk.

Companies operating in industries that use sensitive information cannot be left vulnerable. Data hacks on transport firms that hold passport data, or pharmaceutical companies with medical records, can bring those businesses to their knees, inflicting damage that can last years. Similarly DDoS (Distributed Denial of Service) attacks on retailers can collapse services for days on end.

Unfortunately, attack attempts are not likely to decrease in the future. And, at the same time, the entry of Generation Z into the workplace is getting closer. So perhaps the answer to that big question around ‘Expectations vs Security?’ is not one or the other – but both.

The imperative for business will not be to resist change, but to find ways to innovate safely. The trick will be to provide systems that do not ask Generation Z to conform to an alien and outdated tech relationship, while at the same time maintaining business and personal security.

This approach will only be possible through designing or buying tech that has the behavioural desires of Generation Z built in, alongside robust hack defences. Naturally this will require investment. But that investment will eventually pay for itself through ensuring better cybersecurity, and the ability to appeal to Generation Z employees as they enter the workplace.

The fact is that businesses need to be future-ready for the emerging workforce. In addition, their security systems need to keep everyone, and everything, secure in an increasingly uncertain cyber-world.

The best cybersecurity systems can be tailored to work with new, future-ready tools and keep data safe. Find out how they can make your business the go-to for the most innovative minds of tomorrow.

[su_button url=”http://www.unisys.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on Unisys click here[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Sophos

Sophos Enhances Protection and Incident Response

Sophos announces an update to its Sophos Firewall, now including Sophos NDR Essential, which is free for all customers with an…
Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Riham Security website

Growing Intersec Saudi Arabia

Intersec Saudi Arabia’s Event Director, Riham Sedik, discusses the event’s future growth and government partnerships

Neustar Security Services introduces UltraPlatform

Neustar Security Services, a provider of cloud-based security services that enable businesses to thrive online, is launching UltraPlatform.

Security and fire 2023 trends

In 2023 all industries will face several challenges: sustainability, cost increases, and how to better manage energy & resources.
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise..

LAPSUS$ exposes cyber gaps in organisations

The LAPSUS$ group exploded onto the cyber scene late last year after successfully breaching major companies.
Scroll to Top