Security has traditionally been the domain of the IT department - more specifically, the security staff and chief security officer. From these flow security policies, rules that are laid down for the protection of the company's assets. However, as we have seen in the cases of BYOD in particular and shadow IT generally - where departments will, for example, often buy in cloud services or download applications without going through IT - if employees perceive rules to be inconvenient and obstructive, they are often circumvented or ignored. Security procedures in particular are likely to be perceived as inconvenient. To take an extreme example, blocking up your front door and windows will prevent burglaries and be a very effective security measure, but it is hardly convenient.
Apr-20-2016, 18:10:16 GMT