IT execs must deal soon with worker use of social tools
Workers push for IT adoption of social networking tools like Facebook, Twitter, LinkedIn, video and Foursquare
Computerworld - ORLANDO -- IT execs are forever concerned about the growing number of gadgets workers are bringing from home for use in the enterprise.
The best advice from IT execs and industry analysts at the Enterprise Connect conference here this week was: Keep up with social networks and how they can be used in the business.
"What's driving us in IT is the consumerization of IT," said David Nettles, director of IT architecture and compliance at Rayonier, a global forest products company based in Jacksonville, Fla. "If we don't provide them with a smartphone, they have their own."
Increasingly, he added, IT managers must deal with the spread of social networks in the company, he said. "Now they're all on Facebook and Google+ and Twitter."
Nettles said Rayonier has turned to Microsoft SharePoint and Google Apps to start laying the groundwork to enable their employees to work more collaboratively.
"It's pretty hard for us to control the evolution of technology," Nettles told a conference audience. "At first, we say, let's control it all. We say, you can't post to Facebook while you're at work, but they can. They just pull out their smartphone. To think you can stop them is a little naive."
Social networking use is exploding in the consumer world, says Brett Shockley, a senior vice president and general manager at Avaya, a business collaboration and communications company. And while many companies haven't decided to use social collaboration tools, many of their workers are already using them for business purposes.
"What pushes companies the hardest is that people just start using [social networks for business purposes]," he said. "Companies have to go into police mode to try to stop it. Ultimately, I don't think there's a way to stop it. You can try to lock everything down. But at some point, you have to come up with something."
For instance, many workers use Foursquare to keep co-workers updated on their whereabouts during business travel.
Shockley also noted that a lot of employees use texting tools and Twitter to communicate with co-workers and business partners.
The increasing business use of consumer social tools has a lot of IT managers pretty stressed out, says Shockley. "Every company I talk to says it's real, and that I had better deal with it and figure out how to manage it," he added.
Peter Hirst, executive director of executive education at the MIT Sloan School of Management, says that IT executives must deal with a definite level of user expectation.
Consumerization of IT
- There's still a security disconnect on BYOD
- Why CIOs Shouldn't Block Rogue Cloud Apps
- Field Notes: 'Rogue' employees want IT to lighten up already
- IT shops losing control over technology
- Consumerization of IT in the enterprise starting to pay off
- With BYOD smartphones on the rise, IT headaches will become migraines
- Apple plays defense and offense with free software, upgrade strategies
- The three extremes of corporate BYOD policies
- IT departments won't exist in five years
- The time is right for an 'IT petting zoo'
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Web Apps White Papers | Webcasts