Is Enterprise Security Necessary Now?

By Soko Directory Team / Published June 21, 2022 | 10:20 pm




KEY POINTS

Enterprise security is a multi-faceted concern that includes both the internal or proprietary business secrets of a company as well as the employee and customer data related to privacy laws.




KEY TAKEAWAYS


Enterprise security involves the various technologies, tactics, and processes used to protect digital assets against unauthorized use, abuse, or infiltration by threat actors.


Kenya’s Cabinet Secretary for Health, Mr. Mutahi Kagwe, while addressing the nation, ordered the return of mandatory wearing of facemasks for all Kenyans in public places due to the rise in Covid-19 cases. The positivity rate had hit 12.5 percent.

Mutahi Kagwe’s directive was not something that any Kenyan would want to hear putting in mind what transpired in 2020, 2021, and part of 2022. The lockdowns, the restrictions in movements, and the shutting down of businesses are not something that someone can look forward to.

As to whether Kenya will go back to imposing more stringent measures including companies letting people work from their homes will depend on how careful Kenyans will be and on the rate of the spread. But perhaps this is the time to remember some of the lessons that Covid-19 has taught us so far.

There are three things that came to be the norm in Kenya after the advent of Covid-19 in 2020; wearing masks, washing hands/sanitization, and working from home. Most companies were forced to go back to the drawing board to create an environment that could enable their employees to work remotely and still be able to deliver on their daily deliverables.

One of the positive things that came out of the Covid-19 in Kenya is the realization that technology has amazing potential and power. People suddenly discovered the power of online meetings (and many tools such as Zoom and Teams gained prominence), sending emails instead of physical meetings, and making and receiving calls.

At the same time, almost all commercial banks in Kenya moved their operations to mobile platforms. Banks such as the Co-operative Bank of Kenya had over 94 percent of their transactions moved to mobile. Same to Family Bank, Absa Bank, and KCB Group.

Now, with the increased push for people to work from home, and with the increased access to the internet, came the threat of cybercrime and cybersecurity. It became and still is difficult for business and individuals to protect their personal data and that of their customers from falling into the wrong hands.

It is because of this that we have to consider and rethink enterprise security. Enterprise security is a multi-faceted concern that includes both the internal or proprietary business secrets of a company as well as the employee and customer data related to privacy laws. At the same time, Enterprise security involves the various technologies, tactics, and processes used to protect digital assets against unauthorized use, abuse, or infiltration by threat actors.

The truth is enterprise security that doesn’t properly consider the end-user is doomed to failure. ​With more devices in the hands of employees than ever before organizations risk exposing themselves to cyber threats if their security solutions and services don’t factor in how individuals will actually use them. ​

According to HMD Global, company-owned smartphones have boosted collaboration between colleagues working miles rather than meters apart. ​Unfortunately, if enterprises don’t use technology that is simple, up to date, and accounts for how employees interact with it, there are serious pitfalls that might cost the company, some beyond recovery.

A failure to factor in the disconnect between how technology expects end-users to behave and what the end-user does will limit enterprise security. ​It is important to note that devices and solutions that limit security breaches caused by a lack of employee understanding (or patience) are needed in this hybrid working world.  ​

HMD Global has been ahead of its peers with the amplification and enabling of Enterprise Security. For instance, HMD Enable Pro, an EMM solution, supports Work Profile, which allows enterprise IT to separate company and personal applications and data to different profiles within the same device.

Work Profile helps end-users to get the company apps they need for their work as they become automatically installed through the EMM solution, as the company and personal profiles are kept separate, it reduces the risk of personal privacy and company security infringements.  ​




About Soko Directory Team

Soko Directory is a Financial and Markets digital portal that tracks brands, listed firms on the NSE, SMEs and trend setters in the markets eco-system.Find us on Facebook: facebook.com/SokoDirectory and on Twitter: twitter.com/SokoDirectory

View other posts by Soko Directory Team


More Articles From This Author








Trending Stories










Other Related Articles










SOKO DIRECTORY & FINANCIAL GUIDE



ARCHIVES

2022
  • January 2022 (293)
  • February 2022 (329)
  • March 2022 (361)
  • April 2022 (294)
  • May 2022 (271)
  • June 2022 (231)
  • 2021
  • January 2021 (182)
  • February 2021 (227)
  • March 2021 (325)
  • April 2021 (259)
  • May 2021 (285)
  • June 2021 (273)
  • July 2021 (277)
  • August 2021 (232)
  • September 2021 (271)
  • October 2021 (305)
  • November 2021 (364)
  • December 2021 (250)
  • 2020
  • January 2020 (272)
  • February 2020 (310)
  • March 2020 (390)
  • April 2020 (321)
  • May 2020 (335)
  • June 2020 (327)
  • July 2020 (333)
  • August 2020 (276)
  • September 2020 (214)
  • October 2020 (233)
  • November 2020 (242)
  • December 2020 (187)
  • 2019
  • January 2019 (251)
  • February 2019 (215)
  • March 2019 (283)
  • April 2019 (254)
  • May 2019 (269)
  • June 2019 (249)
  • July 2019 (335)
  • August 2019 (293)
  • September 2019 (306)
  • October 2019 (313)
  • November 2019 (362)
  • December 2019 (318)
  • 2018
  • January 2018 (291)
  • February 2018 (213)
  • March 2018 (275)
  • April 2018 (223)
  • May 2018 (235)
  • June 2018 (176)
  • July 2018 (256)
  • August 2018 (247)
  • September 2018 (255)
  • October 2018 (282)
  • November 2018 (282)
  • December 2018 (184)
  • 2017
  • January 2017 (183)
  • February 2017 (194)
  • March 2017 (207)
  • April 2017 (104)
  • May 2017 (169)
  • June 2017 (205)
  • July 2017 (189)
  • August 2017 (195)
  • September 2017 (186)
  • October 2017 (235)
  • November 2017 (253)
  • December 2017 (266)
  • 2016
  • January 2016 (164)
  • February 2016 (165)
  • March 2016 (189)
  • April 2016 (143)
  • May 2016 (245)
  • June 2016 (182)
  • July 2016 (271)
  • August 2016 (247)
  • September 2016 (233)
  • October 2016 (191)
  • November 2016 (243)
  • December 2016 (153)
  • 2015
  • January 2015 (1)
  • February 2015 (4)
  • March 2015 (164)
  • April 2015 (107)
  • May 2015 (116)
  • June 2015 (119)
  • July 2015 (145)
  • August 2015 (157)
  • September 2015 (186)
  • October 2015 (169)
  • November 2015 (173)
  • December 2015 (205)
  • 2014
  • March 2014 (2)
  • 2013
  • March 2013 (10)
  • June 2013 (1)
  • 2012
  • March 2012 (7)
  • April 2012 (15)
  • May 2012 (1)
  • July 2012 (1)
  • August 2012 (4)
  • October 2012 (2)
  • November 2012 (2)
  • December 2012 (1)
  • 2011
    2010
    2009
    2008
    2007
    2006
    2005
    2004
    2003
    2002
    2001
    2000
    1999
    1998
    1997
    1996
    1995
    1994
    1993
    1992
    1991
    1990
    1989
    1988
    1987
    1986
    1985
    1984
    1983
    1982
    1981
    1980
    1979
    1978
    1977
    1976
    1975
    1974
    1973
    1972
    1971
    1970
    1969
    1968
    1967
    1966
    1965
    1964
    1963
    1962
    1961
    1960
    1959
    1958
    1957
    1956
    1955
    1954
    1953
    1952
    1951
    1950