Print 8 comment(s) - last by chrissyhume.. on Jan 29 at 11:06 AM

There is a major upside to BYOD, but trying to find it has been difficult for companies

Companies are finding out the hard way that employees enjoying a ‘bring your own device’ policy can open the door to costly security issues and loss of productivity.

The wider adoption of BYOD increases the risk of security breaches, according to recently published research, with only a small number of businesses creating BYOD policies.

“Last year was clearly a bumpy road for companies introducing personal devices at work,” said Tony Grace, Virgin Media Business COO, in a press statement. “That’s natural enough as no-one has so far been able to come up with the magic solution. CIOs shouldn’t see this as a burden and in 2013 they can take the lessons learned and turn these personal devices into business enablers to really help drive the bottom line.”

Late last year, a CounterTack survey of IT security officials revealed that most companies are clearly unprepared to tackle BYOD policy.

Companies initially save money by avoiding an initial investment of purchasing smartphones and tablets for employees, though may invest more in the long-term due to BYOD-related costs.

Some security experts have dubbed BYOD as ‘bring your own disaster,’ though password protection, encrypted data, and disabling apps provide temporary security shortcuts to help aid in data loss. Adoping virtual private network (VPN) use and remote lock and wipe functionality on compromised mobile devices are becoming popular solutions to limit damage in case of a security issue related to BYOD.

Research In Motion, the struggling maker of the BlackBerry line of smartphones, has partnered with VMware and Red Bend Software to help develop a BYOD technology for enterprise employees. Utilizing BlackBerry Balance software, workers can use their own smartphones or tablets without compromising privacy or security, and can help split personal and work tasks.

I don’t think there is an easy answer to solve all BYOD issues, although it’s up to the company to create BYOD rules – and work with the IT department to find adequate solutions.

Sources: The Mobility Hub, Virgin Media Business

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

all IT the same
By DockScience on 1/23/2013 2:06:10 PM , Rating: 2
All corporate IT groups are the same.
Control is the most important job. Users and apps are dangerous, the system must be protected and served.

My former Fortune 50 company had a department called: "End User Computing"

What people failed to realize was that this was a verb phrase, not a noun phrase.

RE: all IT the same
By Flunk on 1/24/2013 4:12:39 PM , Rating: 2
Actually... "Computing" is a gerund so it works as an noun phrase.

RE: all IT the same
By ResStellarum on 1/27/2013 11:47:45 AM , Rating: 2
Actually... "Computing" is a gerund so it works as an noun phrase.

I think you missed his point, subtle though it is. Changing the verb mood to infinitive removes any ambiguity: "To end user computing". The meaning being to end any kind of user freedom, rather than the noun phrase which just implies who's actually using a system.

RE: all IT the same
By RufusM on 1/25/2013 12:50:26 PM , Rating: 3
This is the perception of IT/IS as the "We can't do it" department.

IT serves many masters. Those masters demand:
- The system be up 24/7
- Anything should be recovered immediately when someone deletes something or a system has problems
- The system be secure and not allow anything in or out that they determine it shouldn't no matter how much the users/hackers try
- The system be agile and respond to the changing demands of the business
- The system be implemented and maintained within budget parameters

Given these demands is it any wonder why IT has troubles with BYOD? It's not reliable, secure or recoverable. The advantage of BYOD is it's available and agile.

CIO Mindset vs CISO mindset
By Ramstark on 1/23/2013 8:30:02 PM , Rating: 2
The CIO may think "wow, we can go BYOD and save those costly annual contracts with the OEMs" but they are not thinking about the maintenance, user support and obviously the Chief Information Security Officer work.
Now, instead putting those two to fight, why don't companies make the understand that both mindsets can work together: "Let's find a way to save in security hardware AND user hardware" or "Which security issues would our structure face when using BYOD?"
Sadly, the majority of companies just want to "stay updated with the trend" and implement technologies and processes without proper planning...

BYOD forget it!
By johnsmith9875 on 1/24/2013 1:52:04 PM , Rating: 2
The device is the cheap part of the system, why bend over backwards so users can use their equipment. This is one of those times when an Apple-style closed ecosystem is a good thing!

By wind79 on 1/25/2013 1:54:51 AM , Rating: 2
However, the stupidity of the human being knows no boundaries... How to ensure audit compliance? Too much is at risk and the IT has to support them all?

BYOD and Security
By chrissyhume on 1/29/2013 11:06:25 AM , Rating: 2
BYOD is a big security problem, but there are standards an laws such as SOX and HIPAA that do help offer some protection. One of the biggest tools is education. Our hospital put a BYOD policy in place to use Tigertext for HIPAA complient text messaging, but the doctors still used their unsecure regular text messaging. Even though we had a good BYOD policy, it wasn't enough, we had to bring each doctor in to admin for 15 minutes of training and explaining the HIPAA issues and how to use the app correctly. Now we have about 95% of the doctors in compliance. If you want employees to comply with your IT security program, you really need to educate employees about the BYOD policy and the technologies you use weather it is an app like Tigertext or a larger MDM system.

"We’re Apple. We don’t wear suits. We don’t even own suits." -- Apple CEO Steve Jobs

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki