May 2012 Archives
Until a few years ago, email was the favorite route used by spam paddlers. But since the technology became proactive and filters started warding off spams, social media sites have now become the new, safer home for spammers. The practice, called "likejacking" or "clickjacking", can be a lot more effective (dangerous) than the email spams and the bad guys are using them in abundance now.
The need of the hour is to create credibility and trust. CISOs should look for ways to reduce costs and yet deliver a secure environment. They will have to prove that they are part of the profit center, rather than cost center. They might not be increasing the topline of the company, but they can improve the bottomline of the company. It is high time the business side of the CISO also comes to the fore.
Most large enterprises are opening up to the concept of Bring Your Own Device (BYOD). At CSC India, we are also in the midst of it, having rolled it out at the senior management level. We put the BYOD policy in place globally in May last year, and since then it has been a journey for us. Our focus has been on the security of data even as we make efforts to sensitize employees about the possible risks.
We would rather lose our cash-filled wallets today than our smartphones and iPads. These devices carry so much of our personal and business information, that losing any of this would be a security nightmare. The same stands true for businesses. The challenge today is to put in place a formidable security infrastructure and yet ensure that it does not hamper user productivity.
The cyber space is now emerging as a new frontier of war. Last week, hacker group Anonymous launched Operation India, and took down several websites. Private and government bodies in the country need to wake up and synergize their efforts to prevent such attacks that have been creating a nuisance in the past and will continue in the future.
While we have given laptops and high-end devices to some of our employees, the feedback we got from them was that they should be allowed to buy the devices of their own choice and the company could pay for it. So in the next 3-4 months, we will be giving them a particular amount of money (that the management agrees to) to buy their own devices. Going forward, we will not have to worry about asset management. Instead, we will concentrate on security.
I believe that every leader including the CIO needs to empower, delegate and let go of tasks and focus on outcomes. In the end what matters are results ! Manage time and don't live by the clock. Your becoming indispensable to the company is bad for you and the company. It will stunt your growth opportunities and also give you no time.
To help our customers realize business value across outsourced processes in the enterprise value chain, we decided to create a bunch of technology value accelerators. These solutions can be enabled on a mobile device, using the principles of social commerce and placed on the cloud. This has proved beneficial for enterprises, as they are now aware of the information flow pertaining to them on the social medium.
I ask a simple question to CIOs: How many of them go to the shop floor and talk to the people there? As a CIO, if we spend a significant amount of time in the production department, I am sure any application implementation will be successful. That is the simple mantra. Yes, change management is tough. But if you connect with people, you can implement IT easily.
Business-IT alignment means that solutions being implemented are fully in sync with the business strategy of the organization. To ensure this, there has been a huge amount of customization carried out at Volvo Eicher. You cannot put in a standard solution because operating environment differs considerably from one organization to another.