Confronting the Enterprise Security Gap

 
 
By Samuel Greengard  |  Posted 2014-01-31 Email Print this article Print
 
 
 
 
 
 
 
 

Enforcing security policies is a growing challenge for organizations, particularly as they adopt bring-your-own-device (BYOD) initiatives and their employees rely more heavily on consumer devices. Moreover, these gaps represent significant business and IT risks. According to DataMotion's "Secure Email and File Transfer Corporate Practices 2013 Survey," there's a growing disconnect between enterprise security requirements and actual compliance policies. Many organizations lack adequate controls, while others intentionally overlook key factors because they're perceived as cumbersome or believed to interfere with the business. DataMotion CTO Bob Janacek says that a best-practice approach centers on two key areas: effective communication about policies, and the use of appropriate transfer management tools and controls for corporate email, including on mobile devices. "Diligently working to make the technology as easy as possible—and working in concert with the way people work—goes a long way toward increased compliance," he explains. "Business executives must take an active role in making policy part of the DNA of the company. A first step is simple recognition of the financial risk to the organization should a breach occur due to noncompliance."

 
 
 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters