• About Us
  • Advertise with Us
  • Contact Us
  • Events
  • Newsletter
  • Podcasts
  • Digital Magazine
  • Home
  • News
  • Opinion
  • Entrepreneurship
  • Self Development
  • Growth
  • Finance
  • Marketing
  • Technology
  • Sustainability
  • About Us
  • Advertise with Us
  • Contact Us
  • Events
  • Newsletter
  • Podcasts
  • Digital Magazine
NZBusiness Magazine

Type and hit Enter to search

Linkedin Facebook Instagram Youtube
  • Home
  • News
  • Opinion
  • Entrepreneurship
  • Self Development
  • Growth
  • Finance
  • Marketing
  • Technology
  • Sustainability
NZBusiness Magazine
  • News
  • Opinion
  • Entrepreneurship
  • Self Development
  • Growth
  • Finance
  • Marketing
  • Technology
  • Sustainability
Technology

How SMEs can reduce cyber-risk while going digital

The growing connectedness between employees’ work and social lives, and devices, can put workers on a collision course with their company’s security interests.

Glenn Baker
Glenn Baker
July 29, 2019 4 Mins Read
387

Increasingly, we’re seeing the lines between employees’ work and social lives continue to blur, as a result the devices they use in and out of work often become interchangeable. However, this growing connectedness can often put workers on a collision course with their company’s security interests, writes Alastair Pooley.

The size or sector of an organisation does not alter their susceptibility to cyber-attacks, and many small to medium enterprises (SMEs) may not realise they are a target. As the driving force behind New Zealand’s economy, generating more than a quarter of the GDP and employing nearly one-third of the workforce, the data they access and store is too valuable for cyber criminals to resist. However, unlike the largest enterprises, cybersecurity spend is still regarded as a cost centre within SMEs, often leaving them exposed to threats.

Strengthening cybersecurity protections and gaining insight into your organisation is not an overnight process. For SMEs looking to bridge this gap, there are steps that can be taken to mitigate risks and drive value when it comes to cybersecurity. While the initiative must start at the top with IT leaders who can prioritise the issue, it is ultimately about having visibility into and collaborating with your entire organisation to strengthen your defenses without busting the budget. 

Understand your complete IT landscape

In today’s digital economy, IT is no longer the gatekeeper of all technology. Employees procure the applications and devices needed to do their job – even when they don’t have permission from IT. This is a common trend that is accelerating along with the rapid move to the cloud. According to Snow Software’s latest research, 49% of employees in the Asia Pacific region have used work software without IT’s permission, while 55% of APAC employees have accessed work documents on personal computers.

Between the rise of cybersecurity threats and privacy regulations, IT teams and employers need to know where company data is stored, and how that data is used. It is also essential to know that the applications employees have downloaded are up-to-date with the latest patches, or worse still, whether the software is improperly licensed.

Outdated or unauthorised software is a significant challenge for any organisation, creating the potential for security vulnerabilities. Therefore, a first step for SMEs is to attain visibility into the applications in use and the data being stored, in order to help to determine if a potential exposures exist.

Ensure IT policies are understandable for employees

Your people can become one of your strongest assets in defending your business. To protect valuable company assets, SME leaders need to start involving employees in their IT policies. They can start by communicating the implications of an employee’s harmful behaviour to them, whether that’s installing unapproved software or downloading streaming apps onto their work device.

This can be done through a security awareness programme, making IT policies clear yet simple enough to be understood by someone outside the IT department. The communication should begin with employee on-boarding processes and be stripped of technical jargon. The goal here is to communicate the purpose of the framework to employees, helping them understand how their participation ensures their cyber safety, protecting both their personal data along with the companies.

This process should be an ongoing one, with staff continually educated on what potential threats look like as well as any new security policies within the business.

Streamline the processes for all stages of the employee journey

The different needs of employees mean they require access to different company platforms at various stages of their career. This places great importance on a business’ joiner, mover and leaver (JML) process. Leaders need to understand where employees and their IT needs fit in the organisation, to safeguard their data from unauthorised access and ensure they have complete intelligence across their technology ecosystem.

For new hires, businesses need to consider all IT provisions required for new employees, including the devices they will be using, and the access they will be allowed. When an employee moves roles within the organisation, IT teams need to identify the employee’s needs and grant access to any new platforms. On the flipside, when an employee departs from their role , IT should immediately revoke or update their access to company platforms and software to prevent access to proprietary company data.

There are also tools in the market that can help improve efficiency within the management of employee journey, including automation platforms. However, IT leaders should consider what technology and sensitive data resides in their organisation and provide access to employees based on their different roles.

The first step for organisations looking to protect themselves from potential attacks is to first acknowledge that cyberthreats are an ongoing challenge and critical to revenues. Employee access to unauthorised technology should be a signal that communication and new processes need to be put in place within an organisation. Striking the right balance can be difficult but it’s ultimately IT’s responsibility to enable the SME workforce while also mitigating potential risks caused by cyberthreats. Ensuring you have the visibility and intelligence around your technology will allow you to provide the best protection for your organisation while empowering employees to work effectively.

Alastair Pooley is CIO of Snow Software. 

Share Article

Glenn Baker
Follow Me Written By

Glenn Baker

Glenn is a professional writer/editor with 50-plus years’ experience across radio, television and magazine publishing.

Other Articles

James Fuller_Hnry CEO (2)
Previous

Hnry strikes gold in Wellington

SME growth
Next

Tough economy a catapult for small businesses

Next
SME growth
July 29, 2019

Tough economy a catapult for small businesses

Previous
July 29, 2019

Hnry strikes gold in Wellington

James Fuller_Hnry CEO (2)

Subscribe to our newsletter

NZBusiness Digital Issue – March 2025

READ MORE

The Latest

From redundancy to resilience

May 16, 2025

Episode 16: Bryce Marsden on sustainable impact through education, youth and environment

May 15, 2025

The high cost of leadership neglect

May 14, 2025

Why making Auckland a Tech Hub makes sense

May 14, 2025

Is AI making us happier? Why some Kiwi leaders would trade coffee for Generative AI

May 13, 2025

Step back to move forward – how Kiwi business owners can unlock growth

May 12, 2025

Most Popular

NZBusiness Digital Issue – June 2024
Understanding AI
Navigating economic headwinds: Insights for SME owners
How much AI data is generated every 60 seconds? New report reveals global AI use
Nourishing success: Sam Bridgewater on his entrepreneurship journey with The Pure Food Co

Related Posts

Why making Auckland a Tech Hub makes sense

May 14, 2025

Is AI making us happier? Why some Kiwi leaders would trade coffee for Generative AI

May 13, 2025

Samsung CSP: Leading the way in tech repairs across New Zealand

May 12, 2025

Cyber security in 2025: A guide on how to protect your business

April 22, 2025
NZBusiness Magazine

New Zealand’s leading source for business news, training guides and opinion from small businesses to multi-national corporations.

© Pure 360 Limited.
All Rights Reserved.

Quick Links

  • Advertise with us
  • Magazine issues
  • About us
  • Contact us
  • Privacy policy
  • Sitemap

Categories

  • News
  • Entrepreneurship
  • Growth
  • Finance
  • Education & Development
  • Marketing
  • Technology
  • Sustainability

Follow Us

LinkedIn
Facebook
Instagram
YouTube
  • Home
  • News
  • Opinion
  • Entrepreneurship
  • Self Development
  • Growth
  • Finance
  • Marketing
  • Technology
  • Sustainability