Open, transparent and safe?

By

Business in the Participation Age is all about engagement and collaboration. It’s about access, transparency and trust. Today, the isolationist approach to security – the notion of avoiding risk rather than mitigating it – is a surefire way to squash the opportunities and value being created on the network. To be competitive in today’s marketplace, companies must change their mindset and evolve their security culture.

In the Participation Age, "trust" is the name of the game -- the trust that an "open" approach to security can create. How in today's increasingly networked world do you maintain the public trust, remove complexity from security AND adopt a open approach to risk? Here are three rules to follow:

Open, transparent and safe?

Demand better protection with every IT purchase. Use your buying power to make sure security comes integrated into everything -- your servers, your OS, your storage, your application layers -- every IT component you buy.

Make security transparent to the user. The less people have to do to enable security the better. Automate security to make the investment required by the end-user less involved and intrusive.

Take a multi-tiered approach to security. You must intertwine culture, process and, of course, technology to have a successful security environment. Every employee is also a consumer and has been sensitized to the growing security problem by watching the nightly news.

Look, getting security right is hard and it's likely to get harder. But we're entering a time where "open" approaches to business and security will have big payoffs as millions use the network to transact and interact.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Log In

  |  Forgot your password?