December 15, 2022

December 15, 2022

How acceptable is your acceptable use policy?

Your AUP needs to be auditable and enforceable—but there’s a tricky balance between protecting employees and making them feel like they’re working for an authoritarian regime. “It should be written to the end user rather than the technical person who works in security,” says Michaels. “One of the pitfalls that we see in the development of policies is the security leader will either own the creation of the policy or delegate it to somebody on their team, and they won’t go out and source feedback and check that they’re on the right track.” More mature security programs source feedback and have closer partnerships with HR and the other functions in the business. But many companies are “still trying to do the basic blocking and tackling,” Michaels says. “They’re still more focused on the technology and the process rather than the people that they’re impacting.” The AUP should be clear, concise, and easy to understand—not technobabble or legalese. But getting employee buy-in could also come down to something as simple as word choice.


The power of incremental momentum

Companies can get the type of disruptive innovation they need to survive and create lasting change, without moving fast and breaking things. This can be achieved by building momentum for change incrementally. It’s not a new approach, but it can get overlooked when a sense of urgency arises and appears to dictate swift action. ... Incremental momentum has been successfully used in other endeavors. Almost 120 years after Roosevelt’s work, a team of environmental scientists in Finland surveyed the success of incremental change in achieving the country’s sustainability goals. They concluded: “The strengths of small wins include the ability to react to the constantly changing, dynamic conditions…and to deepen trust, commitment and understanding among people.” The report continued, small wins “can facilitate progress and interfere with old routines by bringing about small steps that may result in continuous transformational change and generate radical changes in the long run.” ... The risks were great. The SAP executive team had to balance putting effort into building cloud solutions with maintaining engineering support for the ERP system innovations that its customers relied on.


IT leaders face reality check on hybrid productivity

Organizations are realizing that hybrid work is more about how teams come together — not just what’s right for the organization or individual, says Jonathan Pearce, workforce strategies lead at Deloitte Consulting. So more companies are ratcheting up expectations for their team leaders to decide how work gets done, and then hold them accountable as a team when it comes to performance and rewards. “We’re expecting more team leaders to have open discussions with their teams on what’s working and not working around communication, the norms around [how quickly] they’re expected to respond and how we come together when we need to collaborate,” Pearce says. “The question now becomes how do we up their game as managers — not just managers of work but really orchestrators of a more complex team environment,” Pearce says. Good managers make work more enjoyable for their teams, are better able to identify and use each employee’s strengths and help those workers gain more skills and experience they need to develop their careers and be more productive, he adds.


Improving Cyberresilience in an Age of Continuous Attacks

Effective cybersecurity is about risk management. For example, when banks lend money or issue credit cards, the chief risk officer (CRO) has created a model based on profiles that assume there will be a default rate, meaning certain borrowers may not ever repay their obligations. This is communicated to the chief executive officer (CEO) so that the entire management team understands that it will incur losses from certain customers. Banks are then able to plan and reserve for these losses before they happen. Enterprises must think of cybersecurity in the same manner in which banks lend money. It is only a matter of time before a breach occurs. If the right controls are in place, these breaches are nothing more than a simple incident of 1 machine being compromised vs. an entire network’s worth of data being compromised. Each new attack has the potential to change the threat model. This may not be the first thing on cybersecurity team members’ minds after an attack, but changes could be required immediately.?


The 3G shutdown: Here are the impacted devices. Do you own any?

So, what does this all mean for older hardware like cell phones, alarms, and GPS systems that thrive on the 3G spectrum? To put it bluntly, many of the network-driven features will become obsolete, presenting some unforeseen dangers. Fortunately, there are steps that you and your loved ones can take to safely transition from aging to future-proof tech. In some cases, manufacturers may even be able to give your older gadgets new life through software upgrades. ... Besides ushering in the revolution of smartphones, 3G has played a foundational role in the navigation and alarm-based systems that we rely on during our everyday commutes. With the institution of faster and more reliable 5G, roadside assistance and emergency crash alerts are among the many network-based features that will be affected by the shutting down of 3G. Many cars also have an emergency SOS button that, when pressed, dials first responders via 3G. That, too, will lose functionality. Vehicles from popular automakers like Toyota, Lexus, Nissan, Hyundai, Dodge, and more released before 2019 are susceptible to the issues mentioned above.?


Quantum Computing Will Change Our Lives. But Be Patient, Please

Over and over at Q2B, quantum computing advocates showed themselves to be measured in their predictions and guarded about promising imminent breakthroughs. Comments that quantum computing will be "bigger than fire" are the exception, not the rule. Instead, advocates prefer to point to a reasonable track record of steady progress. Quantum computer makers have gradually increased the scale of quantum computers, improved its software and decreased the qubit-perturbing noise that derails calculations. The race to build a quantum computer is balanced against patience and technology road maps that stretch years into the future. ... And new quantum computing efforts keep cropping up. Cloud computing powerhouse Amazon, which started its Braket service with access to others' quantum computers, is now at work on its own machines too. At Q2B, the Novo Nordisk Foundation -- with funding from its Novo Nordisk pharmaceutical company -- announced a plan to fund a quantum computer for biosciences at the University of Copenhagen's Niels Bohr Institute in Denmark.

Read more here ...

要查看或添加评论,请登录

社区洞察

其他会员也浏览了