The path of least resistance
Most data security breaches occur because the procedures that so many companies introduce become so cumbersome and restrictive that users find a way around them, according to Mark Fullbrook, UK & Ireland director of information security company, Cyber-Ark. Mr Fullbrook identifies this trend as the common issue in many of the recent highly publicised security breaches. Mr Fullbrook believes that the answer to the problem is to put in place controls that not only provide companies with the highest level of security, but also empower users to get on with their everyday jobs. Here he considers how this balancing act, security versus productivity, which he describes as the cornerstone of any security process, can be achieved
I am always amazed when I read about data breaches. Inevitably there is always the admission that there were controls put
in place and that users had stepped outside of these business processes which had led to the inevitable loss of valuable assets
The rest of this document is only available to i-law.com online
If you are already a subscriber, please enter your details below to log in.