For organizations to control access to their most sensitive information, it’s critical to establish specific policies and procedures. A good cyber security strategy should consider the people and processes it impacts as much as the protection it provides.

Historically, security best practices have focused on restricting and blocking access to sensitive data and systems to reduce the threat of a breach. While good in theory, in practice this often impedes employees’ ability to do their jobs, resulting in lost productivity or even workarounds that undermine the security mandate. Read more