Subscribe & Follow
Jobs
- Copywriter Cape Town
- Junior Copywriter Cape Town
- Digital Designer Cape Town
- Digital Marketing and Content Designer Johannesburg
- PR and Digital Content Writer Sandton
- Multimedia Motion Designer Johannesburg
- Financial Accountant Johannesburg
- Sales and Business Development Manager Cape Town
- Content Curator Ilovo, Sandton
- Digital Archive Intern Cape Town
Protecting vital data - who manages IT information?
The scope of what constitutes corporate IT infrastructure has grown substantially, with mobility and social networking considered part of the business network, bringing with it a host of security considerations and management functions.
Realistically, access control is a function that transcends that which takes place physically on a premise and is most definitely part of the security protocol governing internal systems and infrastructure.
Experienced HR and payroll practitioners advise that it is critical for decision makers to be in a position to answer whether their IT infrastructure management is handled internally or outsourced - and to what extent. They also say it is vital that business leaders are clear as to the level at which their systems are secured - particularly if one considers the volume of data being generated and processed through networks.
Confidentiality at risk
It is a question of confidentiality. Years ago, it took expert, specialist knowledge to break codes and process computer algorithms. Today it happens in a matter of seconds. Business leaders must know who is managing their IT infrastructure, how much data and what data is flowing through the network and is there sufficient protection or encryption of sensitive information.
If the decision has been to retain control of infrastructure and the data that lies on it in-house, the element of control is strong - but the support and necessary skills sets it may require to sustain this scenario could be in short-supply. At some point, the business may be forced to consider an alternative option.
On the other hand, if the business is able to partner with a credible, experienced and highly skilled service provider - and the trust is there - this could be a win-win situation. The business knows its core infrastructure is in the hands of a trusted partner who has its best interests at heart and therefore can rest in the knowledge that data is safe. At the same time, the service provider is expanding its client base, adding another satisfied client to its books.
The issue of information integrity lies close to the hearts of professionals working in people development and HR management.
In line with corporate governance legislation, businesses are compelled to document and keep digital records of employees, which includes personal information.
Systems are designed to automatically regulate and correlate this information so that it is easily retrieved, updated, managed and stored. However, who has access to this data and when is always foremost in the minds of management.
Keeping up to the mark
It is not difficult to find examples of businesses that have experienced security breaches on their systems or who have had their brands/intellectual property affected on some level due to hacking activity or the like.
The question begs: if it is discovered that a business' system is not up to the mark in terms of security and lags in keeping up to date with trends and developments, what needs to be done to rectify the situation?
There are two certainties. One is that maintaining the status quo will not cut it, the other is that change is inevitable and the best approach to take is to be proactive.
Solutions must be embraced and strategies implemented. The choice facing decision makers is not whether or not to change, but how quickly and to what extent.