{"id":1772,"date":"2020-07-29T16:15:36","date_gmt":"2020-07-29T16:15:36","guid":{"rendered":"https:\/\/officesuppliesphoenix.com\/?p=1772"},"modified":"2020-08-14T06:07:12","modified_gmt":"2020-08-14T06:07:12","slug":"importance-digital-workplace-security","status":"publish","type":"post","link":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/","title":{"rendered":"The Importance Of Digital Workplace Security"},"content":{"rendered":"<div class=\"top-contrib-block \"><\/div>\n<div class=\"article-body-container\"><\/div>\n<p><em>Co-Founder and CEO of\u00a0<\/em><a class=\"color-link\" title=\"https:\/\/www.lumapps.com\/\" href=\"https:\/\/www.lumapps.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.lumapps.com\/\" aria-label=\"LumApps\"><em data-ga-track=\"ExternalLink:https:\/\/www.lumapps.com\/\">LumApps<\/em><\/a><em>, leading digital workplace communications solution for the enterprise.<\/em><\/p>\n<figure class=\"embed-base image-embed embed-2\" role=\"presentation\">\n<div><img src=\"https:\/\/specials-images.forbesimg.com\/imageserve\/5ee8c0a4bcc30e0006c1d9f4\/960x0.jpg?fit=scale\" alt=\"Young businessman using laptop in office\" data-height=\"4480\" data-width=\"6720\" \/><\/div><figcaption>\n<p class=\"color-body light-text\"><small>Getty<\/small><\/p>\n<\/figcaption><\/figure>\n<p>With all the focus on digital workplaces and remote workers in today\u2019s business world, maintaining secure systems is key to running your operations successfully. Recent legislation has enacted new rules and expectations for businesses, and you need to stay informed on them to keep up with the times. Here&#8217;s an overview of how to achieve a secure digital workplace under any circumstances and on a global basis.<\/p>\n<p><strong>The current state of digital workplace security<\/strong><\/p>\n<p>The security needs of the current digital workplace are changing. Traditional security methods that rely on established perimeters, password authentication and manual permission management are now obsolete. Employees are working remotely more than ever, utilizing third-party mobile applications and their own devices such as smartphones and tablets to perform essential work functions. Perimeter-based security systems are insufficient in such an environment. This new business reality, in combination with recent legislation such as the European Union&#8217;s General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA) mean that your digital workplace security solutions must evolve.<\/p>\n<p><strong>What are the GDPR and CCPA?<\/strong><\/p>\n<p>These two landmark pieces of legislation spell out consumers&#8217; rights regarding how their data can be collected, used and stored. While there are some differences between the two, many of the general principles are the same. These include:<\/p>\n<p><strong>\u2022 Increased transparency: <\/strong>Businesses need to be more open about known security breaches, what data is being collected, whether data is sold to third parties and more.<\/p>\n<p><strong>\u2022 Right to be forgotten:<\/strong>\u00a0Companies have to delete users&#8217; personal information upon their request.<\/p>\n<div class=\"vestpocket\">\n<p aria-hidden=\"true\" data-nosnippet=\"true\">PROMOTED<\/p>\n<div class=\"ntv-wrapper\" tabindex=\"-1\" aria-hidden=\"true\">\n<div class=\"ntv-ad\">\n<div id=\"ntv-rail-0-0\" class=\"show-label\" aria-hidden=\"true\" data-google-query-id=\"CPLxraPt8uoCFRQsrQYdNrkL6A\">\n<div id=\"google_ads_iframe_\/7175\/fdc.forbes\/article\/standard\/default\/standard_5__container__\">\n<div id=\"\" data-str-native-key=\"UCddx8Xg8Mdi8m8PVh1kfbvP\" data-str-visited-flag=\"true\" data-str-arid=\"db30cc29c-5ae2-4b61-a75f-4af14115e08a\" data-str-rendered=\"1596039183326\">\n<div data-tracking-key=\"_xyr6u3kw5\">\n<div>\n<div id=\"str-unique-1596039183326\" class=\"str-more-from-forbes str-card-exp str-editorial- str-insights- str-unique- str-adunit str-clickout\">\n<div class=\"ng-scope\">\n<div class=\"str-bv\">\n<div class=\"ng-binding ng-scope voice\">Civic Nation\u00a0BrandVoice<span class=\"ng-binding ng-scope promoted\">\u00a0| Paid Program<\/span><\/div>\n<h3 class=\"headline ng-isolate-scope\">Connecting Music\u2019s Future With Today\u2019s Leaders<\/h3>\n<\/div>\n<\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ntv-ad\">\n<div id=\"ntv-rail-1-0\" class=\"show-label\" aria-hidden=\"true\" data-google-query-id=\"CM-OsaPt8uoCFfMN5wodf3sBiw\">\n<div id=\"google_ads_iframe_\/7175\/fdc.forbes\/article\/standard\/default\/standard_6__container__\">\n<div id=\"\" data-str-native-key=\"UCddx8Xg8Mdi8m8PVh1kfbvP\" data-str-visited-flag=\"true\" data-str-arid=\"df7f2a2ed-993c-4699-91cf-32c05e228dc7\" data-str-rendered=\"1596039183293\">\n<div data-tracking-key=\"_52iwn3h0q\">\n<div>\n<div id=\"str-unique-1596039183294\" class=\"str-more-from-forbes str-card-exp str-editorial- str-insights- str-unique- str-adunit str-clickout\">\n<div class=\"ng-scope\">\n<div class=\"str-bv\">\n<div class=\"ng-binding ng-scope voice\">UNICEF USA\u00a0BrandVoice<span class=\"ng-binding ng-scope promoted\">\u00a0| Paid Program<\/span><\/div>\n<h3 class=\"headline ng-isolate-scope\">5 Ways To Stand Up Against Racism And Injustice<\/h3>\n<\/div>\n<\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ntv-ad\">\n<div id=\"ntv-rail-2-0\" class=\"show-label\" aria-hidden=\"true\" data-google-query-id=\"CNXVsqPt8uoCFTMTrQYdH1sGYA\">\n<div id=\"google_ads_iframe_\/7175\/fdc.forbes\/article\/standard\/default\/standard_7__container__\">\n<div id=\"\" data-str-native-key=\"UCddx8Xg8Mdi8m8PVh1kfbvP\" data-str-visited-flag=\"true\" data-str-arid=\"d10ddf79f-07e9-4d13-96f0-5085d9add602\" data-str-rendered=\"1596039183549\">\n<div data-tracking-key=\"_ruyefronq\">\n<div>\n<div id=\"str-unique-1596039183550\" class=\"str-more-from-forbes str-card-exp str-editorial- str-insights- str-unique- str-adunit str-clickout\">\n<div class=\"ng-scope\">\n<div class=\"str-bv\">\n<div class=\"ng-binding ng-scope voice\">Grads of Life\u00a0BrandVoice<span class=\"ng-binding ng-scope promoted\">\u00a0| Paid Program<\/span><\/div>\n<h3 class=\"headline ng-isolate-scope\">5 Key Takeaways From HBS Seminar On The Future Of Work<\/h3>\n<\/div>\n<\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>\u2022 Stiffer penalties for noncompliance:<\/strong> Many of the guidelines in these pieces of legislation aren&#8217;t new, but now companies that are noncompliant face harsher penalties (<a class=\"color-link\" title=\"https:\/\/www.gdpreu.org\/compliance\/fines-and-penalties\/\" href=\"https:\/\/www.gdpreu.org\/compliance\/fines-and-penalties\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.gdpreu.org\/compliance\/fines-and-penalties\/\" aria-label=\"up to 40 million euros for the GDPR\">up to 40 million euros for the GDPR<\/a> and up to<a class=\"color-link\" title=\"https:\/\/iapp.org\/news\/a\/top-5-operational-impacts-of-cacpa-part-5-penalties-and-enforcement-mechanisms\/\" href=\"https:\/\/iapp.org\/news\/a\/top-5-operational-impacts-of-cacpa-part-5-penalties-and-enforcement-mechanisms\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/iapp.org\/news\/a\/top-5-operational-impacts-of-cacpa-part-5-penalties-and-enforcement-mechanisms\/\" aria-label=\"$750 per affected user under the CPPA\"> $750 per affected user under the CPPA<\/a>).<\/p>\n<p><strong>How do they apply to data security procedures?<\/strong><\/p>\n<p>Businesses that collect personal data are now expected to offer protection against malicious and illegal activity, prosecute bad actors and inform the public about data breaches <a class=\"color-link\" title=\"https:\/\/gdpr-info.eu\/art-33-gdpr\/\" href=\"https:\/\/gdpr-info.eu\/art-33-gdpr\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/gdpr-info.eu\/art-33-gdpr\/\" aria-label=\"within 72 hours\">within 72 hours<\/a>. This adds new layers of responsibility, as any security breach event must be detected and acted upon quickly. Protecting sensitive data is more important than ever if a company wants to remain compliant and protect its public image.<\/p>\n<p><strong>Important capabilities new security software will need<\/strong><\/p>\n<p>The changing data security landscape demands that companies use security software with these features:<\/p>\n<p><strong>\u2022 Authentication without passwords: <\/strong><a class=\"color-link\" title=\"https:\/\/www.itpro.co.uk\/security\/34616\/the-top-ten-password-cracking-techniques-used-by-hackers\" href=\"https:\/\/www.itpro.co.uk\/security\/34616\/the-top-ten-password-cracking-techniques-used-by-hackers\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.itpro.co.uk\/security\/34616\/the-top-ten-password-cracking-techniques-used-by-hackers\" aria-label=\"Passwords are notoriously hackable\">Passwords are notoriously hackable<\/a> and easily forgotten. This results in poor security, increased employee frustration and lower productivity. Modern alternatives to passwords include tokens, biometric scanners and multifactor authentication systems that combine several methods.<\/p>\n<p><strong>\u2022 Redundant data loss prevention:<\/strong> With the increase in remote work and the many different hardware devices that access company information, it&#8217;s impossible to prevent data loss completely. That&#8217;s why it&#8217;s important to have redundant systems in place for as many layers of security as possible. For instance, features such as email attachment encryption, copy\/paste restrictions and the <a class=\"color-link\" title=\"https:\/\/www.forbes.com\/sites\/billhardekopf\/2019\/10\/22\/protecting-your-data-with-remote-wiping\/#589587516e1e\" href=\"https:\/\/www.forbes.com\/sites\/billhardekopf\/2019\/10\/22\/protecting-your-data-with-remote-wiping\/#589587516e1e\" target=\"_self\" rel=\"noopener noreferrer\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/billhardekopf\/2019\/10\/22\/protecting-your-data-with-remote-wiping\/#589587516e1e\" aria-label=\"ability to wipe lost or compromised devices remotely\">ability to wipe lost or compromised devices remotely<\/a> need to be implemented concurrently.<\/p>\n<p><strong>\u2022 Protected applications:<\/strong>\u00a0This is the age of mobile technology. As many as <a class=\"color-link\" title=\"https:\/\/www.businesswire.com\/news\/home\/20190627005221\/en\/MobileIron-Research-Reveals-8-10-Leaders-Eliminate\" href=\"https:\/\/www.businesswire.com\/news\/home\/20190627005221\/en\/MobileIron-Research-Reveals-8-10-Leaders-Eliminate\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.businesswire.com\/news\/home\/20190627005221\/en\/MobileIron-Research-Reveals-8-10-Leaders-Eliminate\" aria-label=\"42%\">42%<\/a> of workers use business-related mobile applications daily, and that number is expected to increase. Conversely, <a class=\"color-link\" title=\"https:\/\/www.itproportal.com\/features\/implementing-a-mobile-centric-zero-trust-security-framework\/\" href=\"https:\/\/www.itproportal.com\/features\/implementing-a-mobile-centric-zero-trust-security-framework\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.itproportal.com\/features\/implementing-a-mobile-centric-zero-trust-security-framework\/\" aria-label=\"83%\">83%<\/a> of CIOs think mobile security threats are a major problem. Combat this danger by using a zero trust security approach that seeks to verify all aspects of a connection \u2014 including the device, applications on the device, users and networks \u2014 before allowing access.<\/p>\n<p><strong>\u2022 Microsegmented networks:<\/strong>\u00a0Microsegmentation <a class=\"color-link\" title=\"https:\/\/www.networkworld.com\/article\/3247672\/what-is-microsegmentation-how-getting-granular-improves-network-security.html\" href=\"https:\/\/www.networkworld.com\/article\/3247672\/what-is-microsegmentation-how-getting-granular-improves-network-security.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.networkworld.com\/article\/3247672\/what-is-microsegmentation-how-getting-granular-improves-network-security.html\" aria-label=\"implements\">implements<\/a> security protocols for individual workloads within a network. This means each virtual machine can be protected down to the application level. This approach allows companies to quarantine malicious agents once they&#8217;ve penetrated a network&#8217;s perimeter defenses and prevents more widespread infiltration.<\/p>\n<p><strong>\u2022 Robust analytics: <\/strong>A good security system must integrate comprehensive analytics packages. A proper tool set can analyze vast amounts of usage data and correlate patterns to diagnose troublesome areas. It can also identify weak spots and provide insights that result in more informed security decisions. Your entire security philosophy can adjust to current trends rather than remaining static. This makes the organization as a whole more dynamic and less vulnerable to unknown threats.<\/p>\n<p>A digital workplace is a powerful tool that can accelerate productivity and improve the employee experience. It can enable your workforce to easily access applications, endpoints, data and networks from anywhere in order to achieve their business objectives. But it\u2019s precisely this level of access that requires robust security to ensure all business data is kept safe within company walls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Co-Founder and CEO of\u00a0LumApps, leading digital workplace communications solution for the enterprise. Getty With all the focus on digital workplaces and remote workers in today\u2019s business world, maintaining secure systems is key to running your operations successfully. Recent legislation has enacted new rules and expectations for businesses, and you need to stay informed on them to keep up with the times. Here&#8217;s an overview of how to achieve a secure digital workplace under any circumstances and on a global basis. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2515,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[37],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Importance Of Digital Workplace Security - Office Supplies El Mirage, AZ<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Importance Of Digital Workplace Security - Office Supplies El Mirage, AZ\" \/>\n<meta property=\"og:description\" content=\"Co-Founder and CEO of\u00a0LumApps, leading digital workplace communications solution for the enterprise. Getty With all the focus on digital workplaces and remote workers in today\u2019s business world, maintaining secure systems is key to running your operations successfully. Recent legislation has enacted new rules and expectations for businesses, and you need to stay informed on them to keep up with the times. Here&#8217;s an overview of how to achieve a secure digital workplace under any circumstances and on a global basis. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Office Supplies El Mirage, AZ\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-29T16:15:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-14T06:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-content\/uploads\/2020\/07\/LumApps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#website\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/\",\"name\":\"Office Supplies El Mirage, AZ\",\"description\":\"Swift Office Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/#primaryimage\",\"inLanguage\":\"en\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-content\/uploads\/2020\/07\/LumApps.jpg\",\"width\":960,\"height\":640},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/#webpage\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/\",\"name\":\"The Importance Of Digital Workplace Security - Office Supplies El Mirage, AZ\",\"isPartOf\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/#primaryimage\"},\"datePublished\":\"2020-07-29T16:15:36+00:00\",\"dateModified\":\"2020-08-14T06:07:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#\/schema\/person\/2b8c21fb4c500b5ab95fadf0dfe571a6\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/importance-digital-workplace-security\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#\/schema\/person\/2b8c21fb4c500b5ab95fadf0dfe571a6\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#personlogo\",\"inLanguage\":\"en\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cdea6f44468c828871ef784c3a8ce0f6?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1772"}],"collection":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/comments?post=1772"}],"version-history":[{"count":1,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1772\/revisions"}],"predecessor-version":[{"id":2516,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1772\/revisions\/2516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/media\/2515"}],"wp:attachment":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/media?parent=1772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/categories?post=1772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/tags?post=1772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}