World Insurance Report

The path of least resistance

Most data security breaches occur because the procedures that so many companies introduce become so cumbersome and restrictive that users find a way around them, according to Mark Fullbrook, UK & Ireland director of information security company, Cyber-Ark. Mr Fullbrook identifies this trend as the common issue in many of the recent highly publicised security breaches. Mr Fullbrook believes that the answer to the problem is to put in place controls that not only provide companies with the highest level of security, but also empower users to get on with their everyday jobs. Here he considers how this balancing act, security versus productivity, which he describes as the cornerstone of any security process, can be achieved

I am always amazed when I read about data breaches. Inevitably there is always the admission that there were controls put in place and that users had stepped outside of these business processes which had led to the inevitable loss of valuable assets or data.

The rest of this document is only available to i-law.com online subscribers.

If you are already a subscriber, click Log In button.

Copyright © 2024 Maritime Insights & Intelligence Limited. Maritime Insights & Intelligence Limited is registered in England and Wales with company number 13831625 and address 5th Floor, 10 St Bride Street, London, EC4A 4AD, United Kingdom. Lloyd's List Intelligence is a trading name of Maritime Insights & Intelligence Limited.

Lloyd's is the registered trademark of the Society Incorporated by the Lloyd's Act 1871 by the name of Lloyd's.