Make It Personal

By  Ben Halpert — December 01, 2007

While speaking at a recent information security conference, I was asked an insightful question by an audience member: "How do we, as security practitioners, relate enterprise security decisions to the individual user?"
To put the question in perspective, it was asked in relation to the banning of the iPhone by the vast majority of enterprises due to the device's lack of builtin security controls. My response: "the key is to bring the risk home to the user."
It's important to give technology users more information than just simple policy statements that prohibit certain actions. Items that should be mentioned when disseminating security related decisions include:
* relevant background;
* potential risks to the organization;
* potential negative impacts to personal data if such risk management strategies are not also applied on an individual user basis.
Instead of just focusing on risks and protection of sensitive information for the organization, relate such positions to the potential risk an employee would face if their own personal information were compromised. I don't personally know of anyone who wants to become a victim of identify theft. The same is true for organization security issues. People will typically do the right thing with regard to protecting an organization's sensitive information, as long as they are informed of the rationale behind such decisions.
BEN HALPERT, CISSP, is an information security researcher and practitioner and writes monthly about security. Send comments, questions and requests to him at editor@mobileenterprise; please include SECURITY in the subject line.


comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

Current rating: 0 (0 ratings)



Must See


IoT 2020: How Inter-Connected Devices Will Impact the Enterprise

In realizing the vision of the IoT, we are in uncharted territory. It's happening so fast in so many separate pieces that managing and leveraging has escaped a majority of enterprises. This report provides a snapshot of the evolution of the IoT and examines what's to come to help you prepare for the impact—from the onslaught of technology and its unprecedented risk, to attaining the extraordinary value of innovative information.