I was talking with a customer the other day, an IT guy (yes, I know there are \u201cIT gals\u201d out there \u2013 but this one happened to be a guy), and one of his statements struck me. He said\u2026\n\u201cThe world I work in today is very different from five years ago when I told the business what devices, apps and services they could choose from, and they listened \u2013 well mostly listened. Now it\u2019s the business telling me what they need to be successful, driving very specific requirements and making technology recommendations. We in IT have to adapt to the new world and find new ways to be flexible in delivering apps and services.\u201d\nI hear this story often from IT practitioners who\u2019ve had to adapt quickly to the changing digital dynamics of cloud, mobility and social technologies. I also hear that,\u00a0as consumer trends push business technology practices, there is one critical component that can\u2019t be overlooked at any cost: security.\nThis leads me to the next security topic in my\u00a0Five Important Truths about Digital Workspaces in a Dangerous World\u00a0blog series \u2013\u00a0Security can\u2019t come at the cost of user enablement.\u00a0Or, what happens when security and individual productivity collide?\u00a0\nFrustrated Users Will Find a Way. Always.\nIn principle, IT controls technology resources based on requirements defined by the business. But then there\u2019s reality. With cloud and mobility, users are more capable than ever of making their own technology decisions and purchases, and few have real qualms about using their personal, consumer-market technology for work. The uncomfortable reality of this is:workers aren\u2019t making buying decisions with security, compliance, maintainability, integration or other things that IT cares passionately about, uppermost in their minds.\u00a0They just want to get work done quickly and easily.\nPeople are placing an ever increasing demand on IT for faster, better and more nimble solutions.\u00a0So how can IT respond while still driving best practices around security and compliance?\nYou may think this is rare but recently it was revealed by\u00a0The New York Times\u00a0that, while Hillary Clinton served as Secretary of State in the U.S., she didn\u2019t use her state department email but her personal email address. How many of your fellow workers are using\u00a0DropBox, Google Drive, or other unauthorized cloud technologies for storage and document sharing? Most people don\u2019t want to be their own \u201cIT department,\u201d but if they feel a personal technology like Google will help them get their jobs done a little faster, they\u2019ll use it in a heartbeat. And sometimes \u2013 let\u2019s be honest \u2013 they do it just because it\u2019s too difficult to get what they need from their own IT department. Either the process is too laborious, the choices are too few, or they just \u201cneed it right now.\u201d\nRecognizing that each unapproved application or device inside your network opens you up to more vulnerability, IT needs to be able to\u00a0respond quickly to the needs of the business.\u00a0Give people the technology they need when they need it, so they don\u2019t go looking for a quick and easy workaround.\nSecuring the Agile Workforce\nIt\u2019s true. \u201cSecurity can\u2019t come at the cost of user enablement.\u201d\u00a0This means that as you invest in security practices, keep the user experience front and center. For example, consider these questions.\n\nSpeed\u00a0\u2013 Have my security protocols impacted how quickly my fellow employees can access the apps they need to be productive? Or do they actually slow them down \u2013 especially when they\u2019re reacting to customer, colleague and partner demands?\nAccessibility\u00a0\u2013 How easy is it for someone to request access to apps and services? Is it as easy as finding a potential solution online, from a consumer website?\nEase of use\u00a0\u2013 Are my security protocols really seamless? Or do they sometimes cause the worker a moment\u2019s delay?\n\nPeople today have alternatives \u2013 many more than ever before. If you don\u2019t\u00a0keep the user at the center of your security plans,\u00a0you\u2019re at risk of them abandoning your own procedures and protocol. So in effect, a new method of locking down a security vulnerability can actually put you at greater risk by creating a new one \u2013 by giving your workers a motivation to find a workaround.\nFor more of the\u00a05 Important Truths about Digital Workspaces in a Dangerous World, stay tuned for my next blog,\u00a0Truth #3 \u2013 Forget about being\u00a0reactive, or even\u00a0proactive. Today, IT must become Predictive.