How can we prevent workers from using non-approved technology when working outside the office?
Gartner found that the use of personal devices and shadow IT is still common in remote workers, with more than half of employees admitting to using collaboration applications or web services not sanctioned by their company. Consider why they would choose non-approved technologies. The answer is typically one of two reasons.
First, when working outside the office, perhaps at home or on-the-go with their own device, an employee may slip into using tools they do in day-to-day life, simply out of habit and because they’re familiar with how they work. They may not be aware of the risks they could introduce by using these tools, so the best strategy to tackle this behaviour is education and training.
Second, an employee may turn to these tools because they’re having trouble with the ones provided by the company. Perhaps they’re slow, complex or painful to access from outside of the company walls.
Providing tools is one thing, but adoption depends on them being seamless and easy to use. At Canon, this is something we always consider when designing our solutions. Our information management software allows employees to interact easily with their documents in real time, wherever they are, from any approved device and without frustrating delays. But, critically, they also provide intrinsic end-to-end document security. Together with our hardware products, we ensure a closed loop to maintain security at all times.
We know that information security isn’t easy at the best of times. We want to enable organisations to adopt the operating model that suits them, without worrying about compromising security or putting their information at risk.
Working with a trusted partner can take the pressure off your team and give you support in assessing the security risks in your IT infrastructure, helping you to anticipate vulnerabilities and build a technology ecosystem that protects against them, no matter where your workforce is based.