User experience vs user security

简介: The adoption of cloud computing among enterprises continues to accelerate. Seventy percent of organizations have at least one cloud-based application, and they are investing US $1.

User_experience_vs_User_security
The adoption of cloud computing among enterprises continues to accelerate. Seventy percent of organizations have at least one cloud-based application, and they are investing US $1.62 million in cloud computing on average, according to the latest 2016 IDG Enterprise Cloud Computing Study.

With cloud computing in position to become the standard for enterprise IT, many businesses around the world are using it as the cornerstone of their IT infrastructure, transforming traditional operations and processes as a result. However, this poses the challenge of maintaining a balance between optimizing the user experience and keeping data secure, either for employees or customers.

To increase productivity, enterprises nowadays tend to encourage workforce mobility by allowing employees to access business information and applications using mobile devices via the cloud. This migration to cloud-based storage does, however, magnify the security risks to a company's confidential data and resources. A recent Ponemon Institute Study showed that 83% of IT departments agree that employees' devices put an enterprise at risk, and a single mobile device can cost the victim organization an average of US $9,485 when infected with malware.

In addition to the rise of mobile security threats, the increasing number of cyber-attacks and hacking has pushed corporations to up the ante on their applications' security protocols, regardless of whether they are desktop or mobile-based. The downside lies in that more gateways and safety measures equal a larger impact on the speed and efficiency of an enterprise's cloud computing capabilities. Customers or employees lose patience with webpages or applications that are slow to load due to extensive security measures, especially with respect to online retail platforms or corporate websites.

Enterprises should strike a thoughtful compromise between ensuring a high-quality user experience, and maintaining network and cloud security. Most importantly, they should set up company policies that are in place with compliance regulations on data storage and privacy, such as HIPPA and SOX. Security should not be so rigid and cumbersome to make the user experience a grind, nor should it be so lax that an enterprise's data is put at risk to give users a completely hassle-free experience. It often helps to educate users that some safeguards are necessary to keep data secure, which will make them more willing to accept a slightly less than perfect user experience.

目录
相关文章
|
3天前
Example: Auditing the SYS User
Example: Auditing the SYS User
10 0
|
数据安全/隐私保护
remote: Support for password authentication was removed on August 13, 2021
remote: Support for password authentication was removed on August 13, 2021
145 0
|
.NET Windows
BASP21 Pro User Guide
BASP21 Proは、Microsoft プラットフォームで使える純国産のユニバーサルコンポーネントです。 IISアプリケーションのようなサーバサイドだけでなくクライアントのソフトウエアからも 使うことができます。
1646 0
workflow and email in QD3 - IS_INBOX_USER method
workflow and email in QD3 - IS_INBOX_USER method
workflow and email in QD3 - IS_INBOX_USER method
|
SQL Windows
Unable to determine if the owner (Domain\UserName) of job JOB_NAME has server access
早上巡检的的时候,发现一数据库的作业报如下错误(作业名等敏感信息已经替换),该作业的OWNER为一个域账号: JOB RUN: 'JOB_NAME' was run on 2016-6-1 at 7:00:00 DURATION: 0 hours, 0 minutes, 1 seconds STATUS: Failed MESSAGES: The job failed.
1402 0
|
网络安全 开发工具