Striking a balance between user experience and security

Issue 4 2021 Editor's Choice

The business environment is in a state of flux right now as organisations explore what the future of work will mean for them and find their feet. For many of us, the way we work has changed or is about to change again – and this means security boundaries are moving. This presents us with a golden opportunity to rethink both how our organisations operate and how we can embed security so that it works well for the user.

Creating a fluid, effective user experience is critical to the success of your security; if your user experience is bumpy, your people will turn to their own devices, pushing up your security risks. Embedding security in a way that’s barely visible to your users should be the goal. Thankfully, there’s very little resistance to greater security measures with 67% of consumers saying that security is more important than convenience, but that doesn’t mean they welcome adding any unnecessary friction into their user experience.

Striking the right balance between experience and security involves staying open to compromise, being willing to trade pure security for an acceptable, workable level of security that’s easy to adopt. Communication, education and empowering your human firewall should be the foundation stones of effective security in a post-pandemic world.

Below are the three focus areas for creating a great user experience while prioritising security.

1. Put the power back into the human firewall

The first thing to recognise is that some user resistance to security is to be expected. During lockdown, users have potentially had a better experience at home than they had/will have in the office or in a new hybrid working model. With less bandwidth contention, home connectivity can be faster, your users may have been enjoying using their personal devices and they may have had easy access to whatever websites and apps they wanted.

As security teams consider whether current security policies are fit-for-purpose, taking your user experience into account will prove critical to effective security. The challenge is to embed security in a way that wins your people round to compliance, introducing security that makes sense, so that your people won’t revert to using their own unsecure devices. And the right communication is key: your users understand the need for security to protect your organisation and are far less likely to resist when the reasons for your policies are clear. It’s time to put the power back into the human firewall by raising awareness and making it easy for your users to do the right thing.

2. Use friction to your security advantage

An effective way to do this is to introduce a small element of healthy friction into processes, putting in place helpful ‘speed bumps’ to slow your users down long enough to consider the implications of their actions.

It’s like when you get into your car and you make the decision about whether or not to put on your seatbelt. Many cars have a sensor which will remind you, whether that’s a light or an alarm. These sensors introduce some friction into your user experience that’s designed to keep you safe. You’ve been warned, you’re aware of the risk, but ultimately you can still make the decision not to put your belt on.

Let’s transfer that to the business world. Imagine you go to share a sensitive document. Instead of just blocking your ability to send, the system could generate a pop-up that asks you if you’re sure you want to share, giving you the chance to consider and correct your course. The responsibility stays with the user and they’re not frustrated in what they want to do. Your business still operates, but it also reminds your users that they’re being monitored. And really importantly, your users aren't being forced into illicit workarounds to make things happen so your security team continues to have visibility over what your users are doing.

3. Build flexibility into your approach

You’ll write your security policies with your organisation’s interests at heart, but it’s important to recognise that they won’t suit all your users. I recommend listening out for specific groups that are struggling with a policy to understand what they’re trying to do. In some cases, you’ll need to adjust your policy to allow individuals to make the final decision and in my experience, this makes users more likely to work within the rules where they can.

I came across a prime example the other day. The security policy restricted what IT could be taken to high-risk countries, but users had been taking their own devices and using them for business under the radar. The security team switched to outlining the risks and making clean devices available if the user felt comfortable with the risk, empowering the individuals to make the final decision on the best course of action. There was a noticeable increase in the uptake of clean devices, reflecting how people were taking responsibility and working with the organisation’s security rather than against or around it.

In fact, non-compliance with security policies can be a useful indicator of where you’ve got policies and processes in place that aren’t working for users and therefore, by extension, for the organisation either. We often treat non-compliance as some sort of user failure, but we should look at it as a way of flagging where we’re trying to get users to do something they find difficult or ineffective.

A user-centred approach is critical, so let’s make security an integral part of how we shape the future of work, using friction in the user experience wisely to get the results we want.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.