Re: When greed is in charge consumers get the shaft
Short answer, strongly disagree with Jutta.
The issue lies in how the functionality is being delivered. Technology that opens up vulnerabilities to an enterprise's network, poorly authenticate users and/or extract data and place it on portable devices does cause real security and privacy threats to the enterprise, user and client/patient; no disagreement there.
But what if you could use a mobility or remote access technology that poses no incremental risk and delivers you your full suite of digital resources when you were outside of the office? This is not a hope; this technology is available - MobiKEY.
As CEO of the company that provides said secure mobility functionality (MobiKEY) to a number of DoD clients and Corporate America clients, I know the truth lies more with the fact that there are far too many IT leaders that work with OLD architectual approaches to new functionality requirements. Further, acting on a secure mobility strategy should save the enterprise money - yes better security does not have to be a slippery slope to spending more money - and deliver flexibility to the workforce, breaking the chain to a desk.
Far too often IT leaders jump on a new functionality request without figuring out how first to deliver a secure implementation of the functionality. The consequence of a rushed implementation is often not good. There are far too many examples of what happens if the quick and ignorant approach is adopted.
Let's start with figuring out how to do it right versus saying no.