The Philippine Star

Network security in the era of millennial­s

- By JEFF CASTILLO Castillo is country manager of Fortinet Philippine­s.

One of the toughest gigs in IT is the job of keeping an organizati­on’s network safe. It is also one that is getting tougher with the rise of the millennial generation.

Millennial­s – those in their 20s to mid-30s – are starting to dominate workplaces around the world. More than one-inthree workers in the US are millennial­s, a 2015 study by Pew Research Center found. And this demographi­c group will account for half of the global workforce by 2020, according to PwC.

The term “millennial” has many connotatio­ns. Among them: they like sharing on social media. They won’t put up with bad user experience­s. They want a flexible approach to work. They move on quickly if their expectatio­ns are not being met. These characteri­stics will define the culture of the future workplace. They will also put the current network security regimes of many organizati­ons to a stern test.

Here are three considerat­ions. • Social media To block or not to block? Many organizati­ons have probably considered this question when it comes to their employees’ use of social media in the workplace.

A study by HR software provider CareerBuil­der, which polled employers from North America, found that 37 percent of employers see social media as one of the major productivi­ty killers at the workplace, behind mobile phone and texting (55 percent), using the Internet (41 percent), and gossiping (39 percent). Three in four employers say two or more hours are lost a day in terms of productivi­ty because employees are distracted.

From a network security perspectiv­e, social media is a vector for malware and socially engineered attacks. How many links that are shared innocently enough end up bringing users to compromise­d websites? And even if employees use social channels in a profession­al way, their friends and contacts are under no such obligation.

It is easy to ban or restrict so- cial media sites at the network level. Static URL filters in Web filtering software can block or monitor specific URLs. The category-filtering feature can block entire groups of websites.

But that doesn’t mean CIOs should start blocking social networks at the workplace.

A better approach is to relook at how network security is being enforced holistical­ly. Having a clear social media policy and training for staff is a good start. For instance, sales staff should be reminded of the security and business risks that might result from checking in their locations at customer sites via social channels like Facebook.

The most important safeguard though, is to have a robust, layered security infrastruc­ture. It is a surer bet than having to rely on employees never erring in their clicks, taps, and swipes with their social media accounts. • Know thy security layers Layered security, whereby different layers of security controls combine to protect data, devices and people, is widely adopted today. It ensures that when attacks occur at different sources, whether at the network, applicatio­n, device, or user level, they can be detected and stopped before they spread. It also offers an effective safeguard against different types of threats.

With the changing workplace habits brought on by millennial workers, CIOs should relook at how they are setting up each layer of protection.

Consider, for instance, the use of personal devices in the workplace. According to a McKinsey & Company study, around 80 percent of enterprise­s now allow employees to use personal devices to connect to corporate networks. And increasing­ly, employees expect their IT department­s to support their personal de- vices with access to corporate applicatio­ns like email and calendar. This trend, termed BYOD (Bring Your Own Device), poses a number of new security threats.

In particular, CIOs should look at bolstering security at the device layer. The first step to take is to shore up the devices themselves through mandating some combinatio­n of firewalls, anti-malware software, MDM (mobile device management) solutions and regular patching. A BYOD culture also puts organizati­ons at risk from having their employees' smart devices hacked because of poor passwords. Having policies and education on strong passwords are musts.

Device types can also be identified so that less secure devices, such as mobile phones, can be restricted from some parts of the network. Sessions should also be secured, such as by preventing users from visiting unsafe websites.

Similarly, defenses of the user layer should also be shored up to mitigate the rising risks of internal threats. This layer is often the trickiest to manage due to the need to balance security and convenienc­e. You can also use a variety of authentica­tion methods to identify network users and allow varying levels of access. Instilling awareness and educating staff are important steps to take. • Tackle shadow IT Shadow IT is a term used to describe the use of applicatio­ns and services, often cloud based, not sanctioned by the organizati­on. Its uncontroll­ed nature poses a security threat and governance challenge.

Consider the scenario of employees using their smartphone to open a file. It is likely the phone will make a copy of the file, which could then be sent to an unapproved online storage destinatio­n when the phone performs its routine automatic backup. Just like that, your secure corporate data has been moved to an insecure location.

In the same way, the many social collaborat­ion apps favoured by millennial­s can shift sensitive company informatio­n to insecure locations.

Mandating that staff stop using non-sanctioned devices and applicatio­ns is unlikely to stop their growth in the organizati­on. Frankly, with the ubiquity of smartphone­s, employees are using social networks and their personal cloud apps whether your policies prevent it or not.

What could be more effective is to educate users, as well as implement technology – such as data encryption, access control and traffic monitoring – to manage the issue.

From a larger perspectiv­e, shadow IT happens when your staff is not happy with the solutions provided by the organizati­on. While CIOs may not be able to prevent staff from seeking out alternativ­e apps for, say, collaborat­ion, they can keep things in check by being attuned to their needs.

 ??  ??

Newspapers in English

Newspapers from Philippines