Every user needs access to technology tools and resources to do their jobs. However, organizations must restrict access to IT resources to reduce the risk of security incidents. When security is prioritized over access, productivity suffers. Users start looking for workarounds to get their jobs done.
The problem is particularly acute among technical teams. According to a recent survey of IT professionals conducted by Pollfish, 57 percent of organizations require days or weeks to grant access to IT resources. Technical staff reported daily or weekly work interruptions due to access issues in 64 percent of organizations. To overcome these productivity drains, technical users resorted to workaround such as maintaining backdoor access to systems (55 percent), sharing credentials (53 percent) and using shadow IT tools (42 percent).
However, good security is agnostic, giving employees the flexibility to use the devices and tools that make them most comfortable and productive. There isn’t any reason why an organization can’t support Windows PCs, Macs, Linux-based desktops and other devices that users are familiar with. Properly defined policies and controls should allow users to install the software they need without being given administrator privileges over their systems.