Business Continuity In Focus

Page 9

EDGE TECHNOLOGY GROUP

Automation enriches security Interview with Tom Woollard

T

he flexibility of a digital platform is its single biggest advantage, but it also represents its greatest risk because if not configured correctly, it can be a huge security concern. Automating the configuration of a cloud platform can help mitigate this and strengthen the security posture of a firm’s digital roadmap. Although many financial services firms already had a cloud or digital transformation strategy in place, the Covid-19 crisis forced everyone into having a digitally dispersed workforce in an instant. So, service providers, like Edge Technology Group, have moved from from supporting and managing one primary environment per customer to 10 or hundreds or even thousands per customer in some instances. Tom Woollard, Managing Partner & Head of Europe, Edge Technology Group says this dispersed workforce will drive the future trends in both digital transformation and automation. However, this will not necessarily be straightforward. “As much as any cloud solution or digital platform may have supported a prompt and indefinite move to remote working, not many firms would’ve considered doing this, so quickly or broadly for such an extended period of time. As the work force has settled into working from home for a prolonged period of days, weeks and months, unforeseen challenges are common ground, more often than not, in the form of operational challenges and risks,” Woollard explains. Several of these risks are the result of employees working from a large number of unmanaged locations, potentially accessing cloud environments or platforms which are poorly or inconsistently configured. Woollard warns: “When working from home you often have a magnitude of different devices working on the same network, none of which are covered by corporate policy. The inherent risk could therefore be seen as being incredibly high. Even with a secure home environment, some corporate systems may have relaxed access policies BUSINESS CONTINUITY IN FOCUS | Jun 2020

Even with a secure home environment, some corporate systems may have relaxed access policies to allow the workforce to be more productive when working remotely for such an unforeseen lengthy period of time. Tom Woollard, Edge Technology Group to allow the workforce to be more productive when working remotely for such an unforeseen lengthy period of time.” Examples of this might involve loopholes being implemented to allow documents and data to be retrieved and saved on devices which otherwise would not have been allowed. Such loopholes increase the risk of data loss, particularly when firms eventually return to the office. Woollard discusses the way this can be mitigated: “This is where automation can play a key role. As powerful as a digital platform can be, the www.hedgeweek.com | 9


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.