find the latest legal job
Senior Associate - Litigation & Dispute Resolution
Category: Litigation and Dispute Resolution | Location: Melbourne CBD & Inner Suburbs Melbourne VIC
· Come work for a firm ranked in Lawyers Weekly Top 25 Attraction Firms
View details
Associate - Workplace Relations & Safety
Category: Industrial Relations and Employment Law | Location: Brisbane CBD & Inner Suburbs Brisbane QLD
· Employer of choice · Strong team culture
View details
Freelance Lawyers
Category: Banking and Finance Law | Location: All Perth WA
· Freelance opportunities through Vario from Pinsent Masons
View details
Freelance Lawyers
Category: Other | Location: All Adelaide SA
· • Qualified lawyer with a strong academic background
View details
Freelance Lawyers
Category: Other | Location: All Melbourne VIC
· • Qualified lawyer with a strong academic background
View details
Anarchy ahead for IT departments

Anarchy ahead for IT departments

THE INCREASING convergence of personal and business technology is ushering in a new age of conflict between security and business that threatens to end in anarchy, according to a leading…

THE INCREASING convergence of personal and business technology is ushering in a new age of conflict between security and business that threatens to end in anarchy, according to a leading technology analyst.

According to Robin Simpson, research director at Gartner, the boundary between personal and enterprise computing is becoming blurred and new rules are needed to deal with the issue. “The traditional response from the IT department was to say ‘no’, but that’s no longer an option,” said Simpson. “You can’t hold back the changes being driven by your user population by force, or they will simply conspire against you. But you can’t just relax control. You need to find a way to delineate between the business and personal computing worlds so they can work side-by-side and the boundary can be secured.”

“Just as company-owned cars ceased to be an integral element of the employee’s package, so company-owned computing devices, especially notebook computers and mobile phones, need no longer form part of the overall benefits package,” said Simpson.

“Our research confirms that companies around the world are increasingly considering employee-owned devices to be formal business tools. By taking security precautions and investing in foundational security technologies now, enterprises can prepare themselves for increasing use of consumer devices, services and networks with their organisation, and manage these risks.”

Gartner research found that 42 per cent of companies have policies or schemes in place allowing personally-owned PCs to connect to the corporate networks, In the US, the figure was 51 per cent.

Indeed, the trend has led many IT security experts to pronounce the traditional ‘security perimeter’ a thing of the past. “We put a lot of focus into understanding that we can’t think about our technology as having a hard perimeter or a hard core,” said Richard Johnson, head of architecture, research and cybercrime at Westpac.

“When you then factor in and think about your business; the complex business relationships you now have; the trusted or semi-trusted partners that you do business with; the level of connectivity that you may be opening yourself up to or have created bridging their network and yours; whether it’s done as a business-to-business extranet or whether it’s done by their people coming onto your premises with their equipment and then setting up and perhaps tunnelling back into their environment; then talking about third-party arrangements and contracted arrangements or contractors and consultants — it’s a very rich mix of people with access to your systems both physical and logical.

“So it changes the way we think about securing our data and our systems. It’s less now about thinking about the boundary and more about thinking about defence in depth and zones of defence, zones of security.”

Gartner’s Simpson said shifting accountability for security onto users is a potent weapon. “The key is to assume all access to your corporate network is potentially hostile,” said Simpson. “The only real solution is to increase core system and information security while relaxing user constraints and shifting responsibility to them. Although [the tools] may lack maturity and come at a high price, the tools do exist to manage the risks of non-company equipment in the enterprise.”

Stuart Fagg is the Editor of Risk Management magazine. See www.

Like this story? Read more:

QLS condemns actions of disgraced lawyer as ‘stain on the profession’

NSW proposes big justice reforms to target risk of reoffending

The legal budget breakdown 2017

Anarchy ahead for IT departments
lawyersweekly logo
Promoted content
Recommended by Spike Native Network
more from lawyers weekly
Oct 23 2017
How to fail well
The legal profession is due for an attitude adjustment when it comes to perceived failures, accordin...
Oct 23 2017
Lawyers slam rushed consultation for SA repeat offenders bill
The Law Society of South Australia has expressed concern for a proposal to roll out new laws amendin...
Oct 23 2017
The pursuit of happiness in the law
A panel of legal experts have explored how to define success in the legal profession, and how lawyer...
Allens managing partner Richard Spurio, image courtesy Allens' website
Jun 21 2017
Promo season at Allens
A group of lawyers at Allens have received promotions across its PNG and Australian offices. ...
May 11 2017
Partner exits for in-house role
A Victorian lawyer has left the partnership of a national firm to start a new gig with state governm...
Esteban Gomez
May 11 2017
National firm recruits ‘major asset’
A national law firm has announced it has appointed a new corporate partner who brings over 15 years'...
Nicole Rich
May 16 2017
Access to justice for young transgender Australians
Reform is looming for the process that young transgender Australians and their families must current...
Geoff Roberson
May 11 2017
The lighter side of the law: when law and comedy collide
On the face of it, there doesn’t seem to be much that is amusing about the law, writes Geoff Rober...
May 10 2017
Advocate’s immunity – without fear or without favour but not both
On 29 March 2017, the High Court handed down its decision in David Kendirjian v Eugene Lepore & ...