Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Charlie Kirk shot dead
  • Nepal protests
  • Russia-Poland tension
  • Israeli strikes in Qatar
  • Larry Ellison
  • Apple event
  • Sunjay Kapur inheritance row
fp-logo
Citizen IT aids mobile security
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • Citizen IT aids mobile security

Citizen IT aids mobile security

FP Archives • July 7, 2016, 13:01:43 IST
Whatsapp Facebook Twitter

If you declare citizen IT illegal, people will do it anyway, but if you declare the process legal, you can license and supervise the programs employees are creating and using.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
Citizen IT aids mobile security

By John Girard When companies consider mobile security, they often look to technology as the problem or solution. However, people may pose the bigger problem. The majority of challenges are not technical, they are human factor. With the advent of the Bring Your Own IT (BYO IT) world, companies face an interesting challenge: How do you stop employees from creating their own applications when the company doesn’t own the hardware? Everyone owns IT This is the state of mobile security. People will do what they want because they own the devices and they have their own ideas. BYO will not stop — it’s going to continue to migrate. BYO IT doesn’t just mean device, it means apps and databases. IT is becoming a tool that every person owns. While this migration presents challenges, it also offers the opportunity to deputize your employees and enable everyone to become a responsible, creative and autonomous developer. It’s time to usher in the new age of citizen IT. According to a Gartner Strategic Planning Assumption (SPA), by 2020, at least 70% of large enterprises will have established successful citizen IT development policies, up from 20% in 2010. By design, mobile devices may be easy to manage, but what isn’t easy to manage is how employees will use those devices. They may make mobile security mistakes that enable hackers inside the enterprise, particularly if the company fails to create a framework in which they can safely operate. In environments where citizen development projects are not regulated, people will use small systems by companies that may fail or apps that aren’t supported. Or, they may use apps tested by people who don’t have the proper education to know whether the apps are safe or recommended. Further complicating the issue is ownership. If an employee develops an app outside of work, but then uses that application during the day, who owns it? Employees will do as they please. If you declare citizen IT illegal, people will do it anyway, but if you declare the process legal, you can license and supervise the programs employees are creating and using. Stop fighting shadow IT One obvious solution might be to ban individual development or require everyone to use company phones, but the solution that works is to encourage employees to take responsibility for the apps they create for their use. In other words, stop fighting shadow IT and create an environment that holds employees accountable while allowing them to use apps that make sense. IT policies can’t stop users from using their own apps, but they can provide an avenue for the creative and energetic expression by employees. Businesses should pay attention to citizen IT and set rules and resources to encourage people to do a good job when creating apps. Create a toolbox: Ensure that employees have access to professional tools. The company should supply tested, approved and maintained code libraries. This will prevent employees from downloading code with an unknown source from the internet. Set the standards: Allowing employees to have control of business processes turns them into IT service bureaus. If they take on the autonomy and discretion in these developments, they must take on the obligations. Employees should sign HR agreements and mobile policies notifying them of their responsibility. Once people sign, they’ll start asking questions about practices, tools and more to create better apps. Create the boundaries: In areas with sensitive data or mission-critical applications, citizen IT might not be an ideal solution. In a highly regulated industry, set boundaries for employees when it comes to creativity versus production. The author is vice president and distinguished analyst at Gartner.

Tags
Security Gartner mobile shadow IT
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

From governance to tourism, how Gen-Z protests have damaged Nepal

From governance to tourism, how Gen-Z protests have damaged Nepal

Did Russia deliberately send drones into Poland’s airspace?

Did Russia deliberately send drones into Poland’s airspace?

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

Charlie Kirk, shot dead in Utah, once said gun deaths are 'worth it' to save Second Amendment

From governance to tourism, how Gen-Z protests have damaged Nepal

From governance to tourism, how Gen-Z protests have damaged Nepal

Did Russia deliberately send drones into Poland’s airspace?

Did Russia deliberately send drones into Poland’s airspace?

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Netanyahu ‘killed any hope’ for Israeli hostages: Qatar PM after Doha strike

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV