Make It Personal

By  Ben Halpert — December 01, 2007

While speaking at a recent information security conference, I was asked an insightful question by an audience member: "How do we, as security practitioners, relate enterprise security decisions to the individual user?"
To put the question in perspective, it was asked in relation to the banning of the iPhone by the vast majority of enterprises due to the device's lack of builtin security controls. My response: "the key is to bring the risk home to the user."
It's important to give technology users more information than just simple policy statements that prohibit certain actions. Items that should be mentioned when disseminating security related decisions include:
* relevant background;
* potential risks to the organization;
* potential negative impacts to personal data if such risk management strategies are not also applied on an individual user basis.
Instead of just focusing on risks and protection of sensitive information for the organization, relate such positions to the potential risk an employee would face if their own personal information were compromised. I don't personally know of anyone who wants to become a victim of identify theft. The same is true for organization security issues. People will typically do the right thing with regard to protecting an organization's sensitive information, as long as they are informed of the rationale behind such decisions.
BEN HALPERT, CISSP, is an information security researcher and practitioner and writes monthly about security. Send comments, questions and requests to him at editor@mobileenterprise mag.com; please include SECURITY in the subject line.
ME

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.