Monday, November 7, 2011

Three Trends Worrying the CIOs/IT Managers

Do you know the key trends that are affecting information security and are forcing businesses to draft stronger controls as they become popular within the organization? Well, these trends are:
·          Cloud
·          Mobile
·          Social Media

In its 2011 Global Information Security Survey, Ernst & Young informed that “The rise of cloud services, mobility and social media is creating a new security paradigm and companies are having difficulty keeping up”.  The explosive growth of the three has definitely taken the organizations by surprise, they are struggling with ways and means to ensure that there are no security breaches or data loss.

I personally feel that the look for the perfect security to keep in pace with the fast growth of the three technologies will continue for some time.  Organizations need to draft the proper security policies to ensure that infringement does not happen and protecting their customers’ data should be their utmost priority. But they should also keep in mind that the policies do not create disgruntled employees and users.

Here are my suggestions:
·    The issues and concerns about cloud security will continue, but the growth of Cloud will too continue—so if you want to be a step ahead in comparison with your competitors then adopt the Cloud and build a secured network.
·    Consumerization of IT is blamed for the mobility revolution. But it is bound to stay and CIOs/IT Managers should encourage Consumerization of IT to keep their workforce happy, savvy and in sync with the current times. Drafting the right security policy is of utmost importance here (Read my earlier post on Consumerization of IT.)
·    The use of social media and social networking sights continues to explode, and it will do so at least over the next decade and will continue will be an area of worry for the CIOs/IT Managers. But a kneejerk reaction like limiting and not allowing access to social media sites is not the right solution. Here too, drafting the right security policy for the organization would be a proper action.