Configuration Management: A Lifeline for IT Security?

shutterstock_199360082It’s amazing how cloud computing has come to take over a growing number of critical tasks normally handled by IT departments. Unfortunately, it’s not so amazing to IT security workers, who are in great danger of being left in the dust. For computer security professionals, cloud computing could be the one thing that puts them out of a job.

There’s still hope however. IT security professionals may have to live with some of the ongoing changes presented by the cloud, but they can remain in control by reevaluating how their organization uses its technology.

 

A Savior in Configuration Management

Configuration management could be the very thing that saves IT security personnel. The need to keep employer data safe is something that is understood by cloud providers, but the overall practice still leaves plenty to be desired in a variety of areas.

Whereas cloud providers take a somewhat distanced approach to security, configuration management means taking a more hands-on approach, namely by keeping tabs on the software and hardware used throughout the organization. IT security professionals are also tasked with monitoring application use on each employee’s computer.

At first glance, configuration management seems like a hard pill to swallow due to the deep level of understanding required of the enterprise’s operations, choices in technology procurement, and personnel.

On the outset, it seems much easier to let cloud providers take the reins when it comes to security issues. However, this leaves the door open to data breaches and other security setbacks that could prove time-consuming and expensive to resolve.

Proving Worth

As with any sort of change, the hardest part is stating an effective and compelling business case for configuration management. That means demonstrating to business executives how effective it can be when compared to putting cloud providers in the driver’s seat.

For starters, a move towards configuration management can help enterprises better manage their vulnerabilities and prevent catastrophic oversights and mistakes from happening. One such example involves understanding software choices and usage habits among employees. This can help IT security professionals pin-point and flag activities that are out of the ordinary.

Showcasing the potential cost savings offered by configuration management can also help drive the point home and garner interest from top management. For instance, mentioning the potential costs of cleaning up malware on computers left exposed by a lack of a configuration management plan can help bring the benefits into focus.

In the end, configuration management means that IT security personnel can maintain a non-trivial level of control over their infrastructure and perhaps even reduce overhead costs in the process.

Implement a Successful Unified Communications System in 4 Simple Steps

shutterstock_108055643The benefit of Unified Communications (UC) is that it combines a number of different communication methods into one portal, which is increasingly attractive to businesses.

UC is still a relatively new technology and businesses may be worried about the cost, but UC can actually save a business money once they’re past the initial investment. One of the biggest benefits to UC is that employees can use their own devices and can connect from any location, which also reduces travel expenses.

There are four simple ways that a business can make their transition to UC a success:

  • Security requirements
  • Testing the technology
  • Training employees
  • Bring Your Own Device (BYOD)

Security Requirements

Knowing the security requirements first will allow a business to make an informed choice about what services they need. An organization that deals with sensitive data, for example, will have to make the choice between the three types of cloud services: public, private, and hybrid. Security needs will also continue after the UC system is implemented. For example, it’s important to always use strong passwords and pay close attention to call logs.

Testing the Technology

Before making a purchase, businesses should be sure to test out the technology. If a provider won’t allow this, businesses should look for a more reputable vendor.

Employee Training

Once a vendor is chosen and the unified communications system is purchased, employees will need to be trained on the technology. Employees that know what they’re doing are essential to keeping the system running without any hitches, and to ease the transition businesses should inform their employees about the change before it happens.

Businesses should also follow three basic steps when training employees on the unified communications system. The first step is to introduce the technology and show the employees exactly what they’ll be working with. The second step is to thoroughly explain the technology, so that employees know how to use it and what it can do. As a refresher, the technology should then be reviewed again once some time has passed. That way, anyone who missed anything during the first explanation can ensure their questions are answered.

BYOD

Once training is complete, allowing employees to bring their own devices can help simplify the UC process. This will allow businesses to support devices not issued by them and cut down on costs because they are personal devices. BYOD programs are becoming more and more common in the workplace and benefit both employees and the business.

Although a UC system may seem complicated to learn and expensive for the initial investment, it can become a benefit to most businesses. Knowing the security requirements, testing the technology, embracing BYOD, and providing proper training are a few ways to successfully implement a UC system with minimum hassle.