|Page (1) of 1 - 02/07/11||email article||print page|
To balance out a program, we first need to find out the end users’ needs and what their processes are. We then build security technology around that so we're meeting in the middle.
Our overall strategy for data protection and IT policy enforcement is creating technology that allows end users to continue doing their job while protecting electronic assets. Policies and procedures aren't enough: We have to balance it out so that people can still do their jobs.
We don't want anything too restructured or complicated. If that's the case, end users aren't going to use it. We try to keep our policies as minimal as possible and back them up with technology in order to make sure they're followed.
We also look at the importance and confidentiality of the data. I'm not going to cry if the Word document that has today's cafeteria menu on it gets into someone's hands. If it's patient data, though, I'm going to take more stringent steps to protect that data. The key is to add more layers of security around that tower rather than build a moat that surrounds the entire kingdom.
Copyright (c) 2011 Studio One Networks. All rights reserved.