UX versus user security: Part two

Part two: Reducing security complexity for better employee productivity
By François Amigorena, CEO, IS Decisions
IT security is clearly crucial for protecting the network and the resources contained within it. But that said, unnecessarily complex security procedures shouldn’t hinder users, negatively impact on productivity or undermine business performance.

In our recent guide UX versus user security,which is based on a research of 250 British organisations, we found that employees waste 15.27 minutes every week because of complex IT security procedures. That figure equates to 127 days of lost productivity per year for firms of 250 people, and 15.3 days for firms of 30 people. Imagine what those employees could have achieved with that time and the end benefit to the organisation!

When it comes to selecting a security system, organisations need to think about the overall impact it is going to have — for the IT staff, the employees and the organisation itself — and try to strike the right balance between robust user security and a productive user experience. By choosing a system that cuts out the tedious manual processes and hides the complexity of security from the users, it’s possible to improve productivity of users across a business.

Organisations can also customise security by implementing and managing transparent access controls that do not impede user productivity. Logins are the first line of defence in controlling and securing network access so it is important to manage when, where and how the network is accessed to be able to identify if that person is not who they say they are — even if they have the right passwords.

IT departments can easily set and enforce a customised access policy that includes context-aware restrictions such as locations, IP address, time of day, and number of simultaneous sessions that are transparent to the user and does not impede on productivity. These access policies protect against compromised network credentials to reduce the risk of both external attacks and internal security breaches. Ultimately, addressing all the security needs for the network, reducing complexity for employees and increasing productivity.

Learn more about using an effective security solution that does not frustrate IT personnel.

 

(86)

Share