Skip to content

The new reality in the Information Security buying marketplace

2 min read

Mobile is the way forward. 5G is a potential threat to your corporate Wi-Fi. Microsoft Exchange is forcing a move to the cloud, and cybercriminals are getting more and more advanced. What can you do to keep afloat amidst this sea of change in Infosec?

Let's consider one of the most popular business communication tools at the moment - Slack. The US cloud-based service was born into a marketplace that had existed for a long time but founder Stewart Butterfield did something different by focusing on the mobile user experience. The success of Slack is down to the simple idea of bringing the exact same experience of enterprise communication on a laptop/desktop to mobile devices. The company is 10 years old and today they have over 10 million active users on mobile. It’s a very interesting story of growth and the penetration one can have in, and as a result, of mobile.


There is another transformation where we are seeing mobile lead the way over desktop/laptop - 5G. The evolution to 5G is well on its way and the reality is that it is faster and more reliable than the Wi-Fi infrastructure that we are all so used to connecting to. Organisations have invested heavily in building Wi-Fi infrastructure to replace all the ethernet plugs inside their offices, but now 5G is in town, we might have to think again. Sorry for the bad news, but consider this - if 5G is faster and more reliable than your Wi-Fi - which do you think your users are going to connect to? 5G brings new risks to your corporate data if your users are usurping your secure Wi-Fi and performing activities and tasks associated with enterprise information and data on an unsecured cellular network.

The other big change we are seeing is to do with cloud adoption. Organisations are adopting cloud technologies at an exponential rate and for those that aren't, the sobering state of affairs is that nobody is producing software for 'on-premise, in your data centre, run at operations', anymore. If you look at Microsoft's Exchange email platform, the last update to Exchange on-prem was in 2016. What are you going to do when you no longer can apply technology? The long and short of it is, your organisation is going to have to transition to the cloud whether you want it to or not.


And then there's the increase of security breaches all the time despite the amount of money organisations are throwing at technologies. But while we may be able to provide security technologies that lock down the environment if a malicious actor is at work, the user experience may be very poor. Organisations must also focus on agility and usability when deploying new tech solutions. But how can you improve your user experience while at the same time moving at the speed of business and in a secure fashion? 

With all of this new reality in the marketplace an entire new paradigm shift needs to occur as it relates to security and the way it is managed in an organisation. The perimeter is broken and a mobile-centric, cyber resilient approach is the only way to survive.

For more discussion and insights on the latest thinking around mobile and cloud come to our free Mobile & Cloud Security Forums where will will discuss challenges such as:

  • How to keep data secure when the perimeter has gone
  • Securing critical apps and services in the cloud whilst keeping end-users happy and productive
  • Addressing the IT skills gap that comes with the use of emerging technologies 
  • 5G implications for corporate WIFI

    Register now via the button below or find out more information here.

New call-to-action

Latest Blogs

Visit the blog

Overcoming the Most Pressing Challenges CISOs Face Today

It’s no secret that CISOs have some of the toughest roles in any organisation, especially with the...

Read More

How to Calculate a Return on Investment (ROI) of Cyber Security

Cyber security is a minefield for many, not just in terms of its intricacies and ever-changing...

Read More

6 Ways Cyber Security Can Be Improved at Your Company

We know the old ways of working, well, don’t work — and they call for innovative, forward-thinking...

Read More

7 Business Growth Benefits of Cyber Security You Should Know

All organisations understand that cyber security is now an essential expense, helping companies cut...

Read More

The Pros and Cons of a Cost-Benefit Analysis Approach to Cyber Security

The cost-benefit analysis approach to cyber security is perhaps the most popular in helping prove...

Read More

Let's Talk

Get on a first-name basis with the Bridgeway team. Let’s chat about your organisational objectives and any critical cyber security concerns you need to cover.

Let's talk