20.02.2018 Views

NC1801

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NETWORKEXPERT<br />

A TO Z<br />

A TO Z<br />

THE A TO Z OF NETWORKING<br />

A TO Z<br />

A TO Z<br />

WITH CONTRIBUTIONS FROM LEADING INDUSTRY FIGURES AND COMMENTARY FROM OUR EDITOR<br />

RAY SMYTH, WE TRY AND UPDATE ON BOTH NEW AND WELL ESTABLISHED TERMS TO ENHANCE<br />

UNDERSTANDING AND CONSISTENCY AND TO DRIVE THE NETWORKING AGENDA<br />

With BYOD rarely spoken of, is it possible that organisations continue to<br />

overlook the risk that is posed by people at large? P is for People are the<br />

weakest network link. There was a moment in time when employees had an<br />

allocated work PC and that was it, but the rapid arrival and commoditisation of smart<br />

devices means that employees are connecting multiple devices to the corporate<br />

network, and in turn its data.<br />

Peter Low, Director of Field and Lifecycle Services at CORETX commissioned research<br />

among 100 IT managers. Peter says that, "The misuse of work devices is rife and<br />

people using the devices are the biggest threat to a network and its business." The<br />

research indicated that 83 per cent of IT managers had previously found concerning<br />

personal data on employee devices including personal emails, sensitive personal<br />

information, adult content, gambling and profanity. A further fifth uncovered evidence<br />

of an employee's other business interests.<br />

Whatever their intent, the people risk is real. Peter again: "The research, undertaken<br />

with Vanson Bourne revealed that 47 per cent of SMEs have up to 50 unsecured<br />

devices containing company information that are not securely stored. A further 23<br />

per cent couldn't accurately estimate how many unsecured, unused devices they own.<br />

This puts them at significant risk of violating corporate governance and data<br />

protection laws.<br />

"Technology continues to evolve quickly but despite the availability of more effective<br />

new devices, over two thirds of company devices are between three and six years old.<br />

Those looking after this aging device population are contacted by half of employees<br />

with device issues once a month, creating resourcing pressure on IT."<br />

With claims that an average employee now uses three IT devices each day, it's<br />

becoming increasingly difficult for organisations to keep track and manage them<br />

efficiently with insight to their use. Peter again, "Keeping devices working and secure<br />

throughout their lifecycle is difficult. Nevertheless, it's concerning that many companies<br />

aren't on top of this. If employers don't know where their devices are and who is using<br />

them, how can they be redeployed? And with GDPR looming, how can they ensure that they're wiped of sensitive information and<br />

avoid a potential network security risk?"<br />

WWW.NETWORKCOMPUTING.CO.UK @NCMagAndAwards<br />

JANUARY/FEBRUARY 2018 NETWORKcomputing 17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!