NC1801
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
NETWORKEXPERT<br />
A TO Z<br />
A TO Z<br />
THE A TO Z OF NETWORKING<br />
A TO Z<br />
A TO Z<br />
WITH CONTRIBUTIONS FROM LEADING INDUSTRY FIGURES AND COMMENTARY FROM OUR EDITOR<br />
RAY SMYTH, WE TRY AND UPDATE ON BOTH NEW AND WELL ESTABLISHED TERMS TO ENHANCE<br />
UNDERSTANDING AND CONSISTENCY AND TO DRIVE THE NETWORKING AGENDA<br />
With BYOD rarely spoken of, is it possible that organisations continue to<br />
overlook the risk that is posed by people at large? P is for People are the<br />
weakest network link. There was a moment in time when employees had an<br />
allocated work PC and that was it, but the rapid arrival and commoditisation of smart<br />
devices means that employees are connecting multiple devices to the corporate<br />
network, and in turn its data.<br />
Peter Low, Director of Field and Lifecycle Services at CORETX commissioned research<br />
among 100 IT managers. Peter says that, "The misuse of work devices is rife and<br />
people using the devices are the biggest threat to a network and its business." The<br />
research indicated that 83 per cent of IT managers had previously found concerning<br />
personal data on employee devices including personal emails, sensitive personal<br />
information, adult content, gambling and profanity. A further fifth uncovered evidence<br />
of an employee's other business interests.<br />
Whatever their intent, the people risk is real. Peter again: "The research, undertaken<br />
with Vanson Bourne revealed that 47 per cent of SMEs have up to 50 unsecured<br />
devices containing company information that are not securely stored. A further 23<br />
per cent couldn't accurately estimate how many unsecured, unused devices they own.<br />
This puts them at significant risk of violating corporate governance and data<br />
protection laws.<br />
"Technology continues to evolve quickly but despite the availability of more effective<br />
new devices, over two thirds of company devices are between three and six years old.<br />
Those looking after this aging device population are contacted by half of employees<br />
with device issues once a month, creating resourcing pressure on IT."<br />
With claims that an average employee now uses three IT devices each day, it's<br />
becoming increasingly difficult for organisations to keep track and manage them<br />
efficiently with insight to their use. Peter again, "Keeping devices working and secure<br />
throughout their lifecycle is difficult. Nevertheless, it's concerning that many companies<br />
aren't on top of this. If employers don't know where their devices are and who is using<br />
them, how can they be redeployed? And with GDPR looming, how can they ensure that they're wiped of sensitive information and<br />
avoid a potential network security risk?"<br />
WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />
JANUARY/FEBRUARY 2018 NETWORKcomputing 17