User experience vs user security


The adoption of cloud computing among enterprises continues to accelerate. Seventy percent of organizations have at least one cloud-based application, and they are investing US $1.62 million in cloud computing on average, according to the latest 2016 IDG Enterprise Cloud Computing Study.

With cloud computing in position to become the standard for enterprise IT, many businesses around the world are using it as the cornerstone of their IT infrastructure, transforming traditional operations and processes as a result. However, this poses the challenge of maintaining a balance between optimizing the user experience and keeping data secure, either for employees or customers.

To increase productivity, enterprises nowadays tend to encourage workforce mobility by allowing employees to access business information and applications using mobile devices via the cloud. This migration to cloud-based storage does, however, magnify the security risks to a company's confidential data and resources. A recent Ponemon Institute Study showed that 83% of IT departments agree that employees' devices put an enterprise at risk, and a single mobile device can cost the victim organization an average of US $9,485 when infected with malware.

In addition to the rise of mobile security threats, the increasing number of cyber-attacks and hacking has pushed corporations to up the ante on their applications' security protocols, regardless of whether they are desktop or mobile-based. The downside lies in that more gateways and safety measures equal a larger impact on the speed and efficiency of an enterprise's cloud computing capabilities. Customers or employees lose patience with webpages or applications that are slow to load due to extensive security measures, especially with respect to online retail platforms or corporate websites.

Enterprises should strike a thoughtful compromise between ensuring a high-quality user experience, and maintaining network and cloud security. Most importantly, they should set up company policies that are in place with compliance regulations on data storage and privacy, such as HIPPA and SOX. Security should not be so rigid and cumbersome to make the user experience a grind, nor should it be so lax that an enterprise's data is put at risk to give users a completely hassle-free experience. It often helps to educate users that some safeguards are necessary to keep data secure, which will make them more willing to accept a slightly less than perfect user experience.

时间: 2024-11-01 16:20:23

User experience vs user security的相关文章

Talk In Web Security(安全世界观): Devleping a Secure WebSite

Why to write about Web Security? A java file can hack your server.One JSP can download any file. How to do this?   1. Write a JSP and upload to the server.   2. Use JSP to download any bug by HttpClient.    3. Open the virus and get/add the infomatio

java.security.Guard翻译

  Overview Package  Class Use Tree Deprecated Index Help JavaTM 2 PlatformStd. Ed. v1.4.2  PREV CLASS   NEXT CLASSFRAMES    NO FRAMES     All Classes SUMMARY: NESTED | FIELD | CONSTR | METHODDETAIL: FIELD | CONSTR | METHOD java.security Interface Gua

【资料整理】Security Features in the CRT

     本文简要整理了 MSDN 上关于 "Security Features in the CRT" 方面的内容.详细参考官网.      许多老旧的 CRT 函数都有更新且更加安全的后续版本.在安全版本存在的情况下,老旧版本都会被标识为废弃(deprecated)的状态,而安全版本都会以 "_s" 作为后缀. 注意:上面提到的废弃的状态不代表函数已经从 CRT 中被移除,而是表示不推荐使用.而安全版本同样不能阻止或者自行修正安全错误,而是其能够在这类错误发生时

PHP Security Consortium

PHP Security Consortium[31-Jan-2005] An international group of PHP experts today announced the official launch of the PHP Security Consortium (PHPSC), a group whose mission is to promote secure programming practices within the PHP community through e

java.security.PublicKey翻译

  Overview Package  Class Use Tree Deprecated Index Help JavaTM 2 PlatformStd. Ed. v1.4.2  PREV CLASS   NEXT CLASSFRAMES    NO FRAMES     All Classes SUMMARY: NESTED | FIELD | CONSTR | METHODDETAIL: FIELD | CONSTR | METHOD java.security Interface Pub

Jboss EJB3.0 security

  Calculator.java package org.jboss.tutorial.security.bean;   import javax.ejb.Remote;   @Remote public interface Calculator {    int add(int x, int y);    int subtract(int x, int y);    int divide(int x, int y); }       CalculatorBean.java package o

SECURITY INVOKER存储过程权限提升漏洞

MySQL AB SECURITY INVOKER存储过程权限提升漏洞. 受影响系统: MySQL AB MySQL 5.1.x < 5.1.18. MySQL AB MySQL 5.0.x < 5.0.40. 不受影响系统: MySQL AB MySQL 5.1.18. MySQL AB MySQL 5.0.40. 描述: MySQL是一款使用非常广泛的开放源代码关系数据库系统,拥有各种平台的运行版本. MySQL在处理SQL SECURITY INVOKER存储过程的返回状态时存在漏洞,本

PHP安全《PHP Security》

安全 [  原书信息 ]<SAMS Teach Yourself PHP in 10 Minutes>Author: Chris Newman    Publisher : Sams Publishing Pub Date : March 29, 2005 ISBN : 0-672-32762-7 Pages : 264 [  翻译信息 ]翻译人员:heiyeluren翻译时间:2006-3-15翻译章节:<Lesson 24. PHP Security>中文名称:PHP安全 PH

Online CPU Console using a Web Control Library with .NET Security(1)

web ABSTRACTAdministering applications and servers when not connected to the network can be a nightmare, especially when only a few people manage the application. Just imagine going out for an evening on the town and then you're paged at one o'clock