Cybersecurity and Productivity – What is Their Relationship?

  /  ICS Security   /  Cybersecurity   /  Cybersecurity and Productivity – What is Their Relationship?
security

Cybersecurity and Productivity – What is Their Relationship?

Welcome to the Industrial Internet of Things (IIoT) data problem series.  The goal of this series is to help leaders understand the data problems that industrial businesses face when deploying IIoT networks. Cybersecurity was saved for last, as it is perhaps the most prevalent and relevant issue to many organizations. A recent Financial Times report found that “cybersecurity and big data” was the #1 priority for business leaders over the next three years.

Employee Data Requests and Cybersecurity

How many times have you tried to access a system or file on your corporate network, only to be blocked by insufficient permissions with a prompt to “Contact your administrator?”

Do you even know who that is? 
Who should you contact? 
When you contact them, will they respond?

Do you actually track down your admin and get permission? The truth is that when this happens, most people just give up. They decide it’s not worth it to go down the path of getting access to what they thought they needed. Doing so would take too much time away from other important responsibilities, and so they just move on.

In this common situation, we observe the complicated relationship between securing data against malicious attacks and making it available to our workforce – what we call the Insecure Data problem.

Cybersecurity for Insecure Data

The insecure data problem is tricky. It’s not just one of security – it is also one of productivity. It would be very easy to lock down all of our data, but then even our own teams wouldn’t have access to it. So when we talk about the insecure data problem – we talk about data policies that don’t effectively balance security and accessibility.

Corporate strategies must be flexible enough so that people can do their jobs without exposing the organization to harmful risks. Put simply: security policies should let the good guys in (and let them roam freely), but keep the bad guys out, every time.

Finding the right middle ground is hard. Successful cybersecurity for industrial digital projects means striking the perfect balance between breaking down data silos while also upholding data protection.

Continue to full blog post to learn how.

Cameron Archer - CybersecurityThis article was written by Cameron Archer, the VP/GM of Oilfield Chemical Solutions, WellAware.us

Post a Comment