Securing Flexible Working

advertisement
Opinion Piece
Securing Flexible Working
Despite the rising popularity of flexible working initiatives over the last few years,
many key decision makers within organisations view it with suspicion rather than as
a legitimate business strategy. Unfortunately, these suspicions are often a product
of misrepresentation rather than genuine risk. Whilst the virtues of flexible working
are often highly visible in successful implementations, in common reportage the
wide ranging benefits for both individual employees and entire organisations are
almost always counterbalanced with a superficial shrug at apparent security issues,
often proposed to be a problem inherent to flexible working.
To be clear, the attitude that flexible working and robust security are somehow opposed
to one another is simply not current. Flexible Working is supposed to be a progressive
idea; something capable of innovating decades-old working habits. Why then, are the
most common protestations always centred on its incompatibility with antiquated security
systems? Supporting flexible working does not mean engaging in some high-risk balancing
act, employee flexibility at one end and data protection at the other, it simply means adapting
security measures to meet the new demands that flexibility and mobile working raise.
The best security policies are agile and reactive, constantly evolving to overcome new
challenges as they arise. Security shouldn’t be regarded as a barrier to flexible working, but
rather flexible working should as an opportunity to improve security.
Inevitable Flexibility
In truth, only the staunchest opponents of Flexible Working will be able to resist its rise over
the next few years and even then only by enforcing draconian user-policies. Countless recent
surveys from major analysts all indicate that more and more employees are choosing to adopt
various flexible working behaviours without the full consent of their respective IT departments.
For instance, the consumerisation of IT is not a trend that shows any sign of slowing down
and a recent survey of IT managers by Cisco found that 51% said the number of employees
bringing their own devices to work is on the rise. Similarly, a recent survey of directorlevel professionals by Forrester found that 41% of respondents said they used an iPhone
or an iPad at work. IT consumerisation is being endorsed at high levels in organisations
everywhere, and popular demand is beginning to outweigh the reservations of worried IT
staff. Mere prevention is looking less and less like a feasible option.
Similarly, legislation now obligates employees to seriously consider flexible working options
for employees that request it. This could be down to anything from excessive travelling to
those workers with commitments such as carers or new mothers. Regardless, organisations
will need to ensure these employees can access corporate data, applications and networks
remotely, from home or on the move, day or night. Providing such staff with secure access
points is vital to ensuring they can remain productive wherever they are working from, but it’s
also necessary to consider what corporate data they might be carrying with them, and how
best to keep it safe.
Securing Flexible Working
Page 1 of 2
Keep it Functional
Just as flatly refusing to acknowledge flexible working disregards the huge range of benefits
associated with it, so too can enforcing a poorly devised set of security policies strangle
the effectiveness of an attempted implementation. Importantly, employee flexibility is not a
uniform currency - every member of staff will have different requirements from corporate
systems that all need addressing and crucially, securing.
Of course, formulating individual user policies and security measures for each member
of staff would in most cases be an impractically large task. Fortunately, it’s also seldom
necessary. Instead, IT departments would do well to accompany any flexible working plans
with detailed user-profiling to reduce individual behaviours and requirements into more
manageable categories. By ascertaining which workers need access to specific applications,
on which devices from certain locations, IT professionals can establish broad user-types,
each with specific permissions and policies that can be managed collectively and centrally.
Reducing a workforce down to these groups not only makes securing access points a
much less daunting tasks, it can also speed the process of any plans to implement virtual
desktops – a measure that usually sits alongside and supports flexible working. With a
detailed plan of user-profiles, organisations can build and push out virtual desktops to
employees anywhere, equipping them with all of the data, applications and access options
necessary for them to work effectively. Employees can then access these virtual desktops
from either a thin-client, a secure container on an external device or even from a flash drive
providing highly secure access to private networks at no cost to productivity or functionality.
Make it Easy
Even with the most comprehensive security policy in the world, if it is too complex, obtuse
or time-consuming for employees to use effectively, chances are they’ll just ignore it. This
could mean one of two things: either they’ll stop working on that specific device or from
that specific location, or they’ll find a way to get around the restrictions. The former tends
to breed discontent and friction between users and IT, and the latter poses more serious
risks to security.
Instead there must be an intelligent discussion between IT and end-users to establish the
best balance between security and functionality. This doesn’t have to mean simplifying
security policies to appease uncooperative or impatient employees, but instead that
usage policies must be carefully designed to seriously consider their impact on end user
experience, and then clearly communicated to the people they will impact. End-users
will tend to behave in the most immediately intuitive and ‘easy’ way, especially if they’re
working on a device they partly own. Consequently, IT professionals must be mindful of
the employee behind the device they are securing, and the policies in place must be
reconciled with the needs and capabilities of the end user negotiating them.
Similarly, ensuring easy recovery from any unprecedented security breaches is obviously
one of the best ways to secure your data before problems arise. This is why many
organisations opt to keep company data off specific devices with a virtual desktop
arrangement. But in the event that an employee is carrying around sensitive information
that is then lost or stolen, forward-thinking IT departments will be able to remotely wipe the
device as soon as it becomes compromised. Proactive, multi-staged security measures
like this ensure flexible working doesn’t come at a cost to security, but rather improves it.
The Mansion House
Benham Valence
Speen
Newbury
Securing Flexible Working
Berkshire
RG20 8LU
T: +44 (0)844 2250526
F: +44 (0)1635 568001
E: info@2e2.com
Page 2 of 2
Download