Digital Usage Policies and the ‘New’ Desktop
The PC desktop is changing, so fast that what used to confidently be called the “desktop” is undergoing the sort of rapid evolution bound to throw up new and unfamiliar security challenges.
Technological developments such as smartphones, tablets and mobile operating systems can be wheeled out to partly explain this change. However, it is to the humble user rather than computer architectures of network topologies that we must pay the closest attention if we are to understand how the business desktop will be reshaped from the ground up over the next decade.
Adopting privilege management concepts will not necessarily offer a complete solution thanks to a growing band of apps – Windows 8 “Metro” apps for one – that install without asking for elevated rights. Granted, Microsoft’s design improves on the mistake of creating applications that require privileges and end up being funnelled inefficiently through Windows User Account Control (UAC), but leaves hanging the question of whether even standard user apps should be allowed in the first place.