Me, Myself & iPod
|
|
|
|
|
According to research by Marc Prensky consultancy, the typical 21-year old graduate entering the workplace has approximately 5000 hours of gameplay experience, exchanged 250,000 e-mails and instant messages, spent 10,000 hours on a mobile phone and 3500 hours surfing the Web.
Employers around the UK are now facing the challenge of having to appeal to these budding young professionals who, unlike previous generations, have grown up using technology in every day life.
The iPod generation will expect a certain degree of leniency when it comes to using technology for leisure pursuits while at work. So how can employers ensure that a harmonious co-existence between productivity and leisure time is found, so as not to destabilise employee morale? By implementing information security practices that are geared towards enabling rather than restricting, management can still entice and retain high calibre candidates; while still ensuring productivity and business continuity.
A report in the Times Higher Education Supplement in late 2005 suggested that undergraduate university applications were down 5% compared with that of the previous year, fuelling speculation of a skills shortfall in 10 years time. With this in mind, it is now the graduates who have the upper hand when applying for jobs and when ultimately coming to accept a position. Figures from Prospect Careers, an advisory service for postgraduates, suggest that graduates are taking longer to find the perfect job, almost 30% taking up to six months to pick and choose that all-important first career step. No longer is it enough to simply offer prospective employees the traditional benefits, such as contributed pension schemes, gym memberships, social events, bonuses, and flexi-time; instead, these are almost a standard expectancy of graduates entering the workplace.
Todays 21st Century worker demands more from their employer, for example, the almost unequivocal and unwritten right to send personal e-mails and instant messages during work time, the right to listen to music on an MP3 player at work, all with the aim of breaking the flow of the day. According to Paul Wakeman, Founder of the Total Recruitment Group, a London-based recruitment firm: This is a trend we have noticed for a while, especially with high-end graduates leaving the top UK universities. By the time they have finished their course, they are savvy enough to realise their business potential and value. We are finding that candidates today are far more selective about which position they ultimately go for, and the corporate culture is very much a persuasive factor when coming to make a decision.
Some businesses have marketed themselves specifically to appeal to this new generation of professionals, with some offering duvet days as an added incentive. In fact, one UK employer hands new starters an iPod Nano that has the company handbook preloaded as a Podcast on the device. So how can HR and IT departments work together to ensure that the organisation remains attractive, while ensuring that corporate security is in no way compromised? Developing Acceptable Use Policies (AUPs) is the first and most important step when considering the restrictions to enforce on employees use of technology in the workplace. An AUP should be fleshed out and driven by the HR and IT departments, and must set clear boundaries for using technology within the workplace. The IT department, however, plays a pivotal role in how an AUP is not only enforced, but how it can impact the working ethos of each individual member of staff.
Once a rigid AUP is finalised, the underpinning security technology should ease the headache for IT security managers who are left to enforce and supervise these policies. The security department itself has its own objectives, which differ greatly from that of the HR department. The security team is interested in protecting the corporate network and ensuring that no instances of downtime occur, protecting against corporate data leakage, and to ensure that corporate applications are available for intended business functions.
The current generation of graduates are perhaps more gadget savvy than any other generation of technophiles, whether it be music players, USB sticks, digital cameras, the iPod generation represents a significant proportion of the working population. As these devices are personal in nature, the likelihood of them being carried into, and used in the enterprise is a certainty that many businesses are ignoring, mostly because they represent an enormous management headache for IT security managers. Equally, staff opening viral attachments, downloading files and visiting non-work related websites that introduce malware pose a huge risk. Often, businesses will negate such risks by enforcing a strict policy of no removable media within the enterprise.
Whitelist technology however, can provide a definitive and reliable solution to all security worries associated with enabling the modern day worker. The whitelist approach provides businesses with an opportunity to use USB devices as a legitimate business tool. USB sticks for example, are now available with 16GB capacity, and could if needed, provide a vehicle for data leakage or an entry point for malware. Employers can use the flexibility of whitelisting to either deny removable media from plugging into the network, or restrict its use to certain times of the day. Equally, downloaded unauthorised applications (including malware) will be denied the ability to launch and install, as the whitelist does not recognise the file as being on the list of applications allowed to run on a PC.
The way the market is currently directed, USB sticks will eventually become as ubiquitous within the enterprise as mobile phones. In fact, now that 64GB removable media are available, the options are virtually endless. Staff could in the near future, be given a USB stick which has all the applications needed by the employee pre-loaded and configured to connect to backend business applications once the device is plugged into a PC or thin client on the network. This device could also be used by staff as a remote token, which opens doors and contains credit for staff to purchase drinks at the vending machine. The possibilities are endless, and need not be a security nightmare.
Considering the competitive recruitment landscape, UK businesses need to differentiate themselves from competitors and promote themselves as modern, cutting edge organisations that embrace new technology, rather than fear the unknown. A clearly defined AUP, combined with whitelist technology provides a compelling argument for businesses to change their work ethos, improving corporate competitiveness without jeopardising IT security.
Dennis Szerszen, SecureWave
BIOS, Feb 01, 07 | Print | Send | Comments (0) | Posted In Networking
Related Articles
E-Filing For Beginners
Turning Regulation Lemons To Lemonade
Test Before You Leap
A Practical Guide To Continuity Planning
Self-Destructing Video E-Mail Introduced
GlobalScape CuteFTP Professional 8.0
Best Practices For Preserving Security
IPSWITCH TRANSFERS WS_FTP INTO YOUR CHRISTMAS STOCKING
Using Compliance To Your Advantage
The Lost Art Of Managing Risk
More...
|