We use cookies to improve your website experience. To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy. By continuing to use the website, you consent to our use of cookies. Close

The path of least resistance

World Insurance Report

The path of least resistance

Most data security breaches occur because the procedures that so many companies introduce become so cumbersome and restrictive that users find a way around them, according to Mark Fullbrook, UK & Ireland director of information security company, Cyber-Ark. Mr Fullbrook identifies this trend as the common issue in many of the recent highly publicised security breaches. Mr Fullbrook believes that the answer to the problem is to put in place controls that not only provide companies with the highest level of security, but also empower users to get on with their everyday jobs. Here he considers how this balancing act, security versus productivity, which he describes as the cornerstone of any security process, can be achieved

I am always amazed when I read about data breaches. Inevitably there is always the admission that there were controls put in place and that users had stepped outside of these business processes which had led to the inevitable loss of valuable assets or data.

The rest of this document is only available to i-law.com online subscribers.

If you are already a subscriber, please enter your details below to log in.

Enter your email address to log in as a user on your corporate account.
Remember me on this computer

Not yet an i-law subscriber?

Devices

Request a trial Find out more