If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for Pikachu.
Five Lessons From ‘Pokemon Go’
In the workplace, cloud apps such as “Pokemon Go” are wildly popular — and have been for a while. We all want to play, but CISOs must consider some general security requirements to be both efficient and safe.
Here are five requirements from “Pokemon Go” that can be applied to adopting cloud apps in your organization.
1. Visibility Is Essential
There are lots of Pokemon out there, but which ones are best for your needs? Having a good view of all the apps in use within your organization will not only help understand what needs your employees are looking to address, but also provide insight into where you might need to take corrective actions.
For every Blastoise, there are ten Magikarp. Pick the apps that address the right balance of functionality and corporate security requirements.
2. Connectivity Matters
Games are no fun if you have to enter a long, complex password every time you want to play. The same goes for cloud apps. You need to ditch the passwords in favor of a federated system that enables strong authentication but does not require employees to enter long passwords or write complicated ones down on sticky notes.
3. Policies Must Be Enforced
One of the great things about “Pokemon Go” is that it gets kids (and parents too) out of the house and active. This is great, but some rules have to followed. You wouldn’t want your kids wandering around in strange neighborhoods or out all night.
This also applies to cloud app usage. Policies have to be in place to ensure apps are used within corporate guidelines, ensuring safety for both the employee and the organization.
4. Have a Mobile Strategy
Cloud apps such as “Pokemon Go” are designed to be used on mobile devices. When deploying cloud apps to the enterprise, you have to consider mobile devices as a primary platform. It requires the same security safeguards and user experience that your employees on laptops behind the firewall have.
5. Education Is the Best Defense
Educating your employees raises their combat power (CP) to defend against threats. The more employees know about appropriate app usage and the potential threats, the lower the chances of their being taken down by Charizard — or an easily defeated cyberthreat.
Remember, just like with “Pokemon Go,” the key to success is to stay active and vigilant. Taking an active security role makes cloud applications safer for everyone.
Schedule a consultation today to learn how Flagship can help you protect your business.
If you liked this blog, you also might like: Endpoints: The Beginning of Your Defense
IBM Security: Cloud
 IBM protects cloud environments with cloud security strategies and a comprehensive portfolio of solutions. These security solutions span the entire cloud lifecycle and all security domains – including identity and access management, application and data security, infrastructure protection and security intelligence for the cloud.
-
How IBM Helps Secure the Cloud
-
IBM Security helps customers secure public, private and hybrid clouds. With IBM Security customers can manage user access to cloud applications and protect the data that lives in the cloud. Customers can use IBM Security products like QRadar to gain full visibility into security threats facing their organization.For more information, please visit http://ibm.co/1zlRM6Y
-
Infographic: Cloud Security Superhero
-
Keeping cloud apps safe for employee usage and to gain corporate efficiencies may look like a daunting task for a mere IT mortal. Your employees are not normally malicious in their actions, but you might feel like you need a super hero to save you after looking at some key research findings:33% of employees save and share corporate data using external cloud platforms25% of employees use their corporate credentials when accessing 3rd party cloud apps57% of employees know their usage of cloud apps is violating company policy, but do it anywayYou don’t need X-ray vision or super human strength to protect your enterprise from unapproved cloud app usage and cloud-based threats. What you need is a good strategy and the right technology. IBM Cloud Security Enforcer helps you gain visibility into your existing cloud app usage – both what you know about already and what hides in the shadows. You can use this knowledge to lay out a clear cloud app strategy that aligns with your employee and corporate needs.IBM Cloud Security Enforcer also helps you deliver on your strategy. The solution helps to connect users to approved apps in a single bound. It helps you to protect the business from cyber criminals and bring internal wrongdoers to justice. You don’t need to be born with super-human strength or have mutant abilities, IBM Cloud Security Enforcer can give you the powers you need to be a Cloud Security Superhero.
-
Infographic: Uncovering the Truth About Cloud Computing
-
Cloud adoption has seen unprecedented growth. But not everyone has bought in just yet. For non-cloud adopters, concerns about security risk still cast a shadow of doubt over the rewards that cloud computing offers. Don’t believe the hype.
-
eBook – Forbes Insight – How the cloud is changing business resilience
-
Resiliency can be a competitive advantage, not merely a technical solution with a cost. The cloud enables a broader set of companies to consider a broader set of applications to grow their businesses in the expanding data universe.
-
Implementing Cloud Security with IBM Security Solutions
-
This video provides insight into the capabilities needed for implementing cloud security. Information related to solutions for protecting cloud workloads that is suitable to your enterprise is provided. The need for having an integrated approach that helps in developing security intelligence to proactively defend the cloud and be ahead of advanced threats, is discussed.To know more about IBM Cloud Security: http://ibm.co/Wi6P2J Learn more about IBM Security: http://ibm.co/ibmsecurity