UX versus User Security: Part three

Part three: Reduce the impact security has on IT
By François Amigorena, CEO, IS Decisions 
There are a lot of barriers when it comes to guarding against compromised credentials and many solutions can add further complexity to the IT department. In fact, in our guide UX versus User Security, (featuring a survey of 500 IT Security Managers in the US and UK) we found the three biggest barriers to guarding against compromised credentials to be: complexity within the IT infrastructure; having the time to manage and properly oversee the network; and the cost of technology solutions.

Each issue is a serious challenge in its own right and some IT departments may face more than one simultaneously. For example, the side effect of a complex infrastructure is that it is probably time consuming to manage. But what IT departments need to know is that finding a way to overcome these barriers doesn’t need to be frustrating and doesn’t mean they need to start from scratch.

My advice would be to seek out solutions that are adaptive to the existing IT infrastructure and can be deployed across all users without the need for additional hardware or software such as tokens or individual installations across workstations. This effectively tackles the three major barriers — complexity, time and cost — in one hit.

By choosing a solution that leverages existing investments in IT infrastructure and can be remotely installed — rather than individually workstation-by-workstation — without the need for complex or customised code, it is possible to guard against compromised credentials without additional headache for the IT department. Most importantly of all, make sure it is easy to manage.

Compromised credentials is a very real thing and it can happen to anyone, anytime and from anywhere so it’s important to it take seriously. While there may be barriers, there are certainly credible options for IT departments that will help them take the necessary steps to protect the organisation and its employees from threats.

Learn more about Supporting user experience through education to cultivate a culture of security within the organisation.

(83)

Share