8 Tips for Ensuring Employee Security Compliance

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next 8 Tips for Ensuring Employee Security Compliance-6 Next

Biometrics and Single Sign-On

Simplify access to the corporate network from anywhere by using biometrics combined with single sign-on to connect to key apps and data. It's common to go through multiple steps to access key apps and data behind the corporate firewall, and in many cases, each system includes its own login process. By reducing multiple steps to log in, IT and security administrators can limit user frustration, while making it easier for people to comply with security policies. Fewer people will then seek ways around security, and their productivity will increase – and hopefully eliminate, if not reduce, shadow IT.

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. However, many times apart from security professionals, a deeper understanding of the strategy and importance of these policies is overlooked. October is National Cyber Security Awareness Month, which was created as a collaborative effort between the government and the security industry to ensure everyone has the resources they need to be more secure and aware of threats. This month especially, CIOs, CSOs and security experts focus on educating employees about the importance of security, making sure everyone understands its business objectives, uses the appropriate tools and complies with policies used to keep both company and personal information safe. 

One strategy for security professionals to use to educate others is through “real talk,” which breaks things down to their basic elements and eliminates any confusion for employees when discussing IT strategies or security policies.

Bill Burley, corporate vice president and general manager at Citrix, has built his career around "real talk.” As a result of these kinds of conversations, he’s been able to identify the top eight tips for enterprise security professionals to ensure that employees effectively use security measures this month and all other times.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.