Interviews

Bring your own

by Mark Rowe

A comment on BYOD from Righard Zwienenberg, Senior Research Fellow at ESET.

Should (B)ring (Y)our (O)wn (D)evice be reinterpreted as (B)ring (Y)our (O)wn (D)estruction? In the race to embrace and benefit from new technology, many organisations are blinded by the over-influencing financial considerations of believing they can save expenditure by having their employees or students use their own kit. In fact they might be putting their most valuable business assets, their confidential network and customer data, at risk.

BYOD, although providing the flexibility that many employees would like to see, brings with it a unique set of challenges that can be detrimental to an organisation of any size stemming from the extension of the network’s perimeter and a plethora of loose ends beyond the IT manager’s reach. Ignorance of security policies is another key factor. New research, commissioned by ESET, found that 38 per cent of Gen-Y professionals, those aged 18 to 30 years old, are unaware of, or don’t believe, their company has an IT security policy. The education of staff is key to securing any organisation as breaches are often the result of human error.

Although developing clear policies, providing security training to all BYOD-enabled employees and implementing password-protected auto-locking will help minimise security risks, it is impossible for a corporate security team to know about all operating systems, applications or firmware for all devices. Even if they had a great detail of information on each device, there may be an update or operating system that brings new features to the device, which is difficult to manage without expertise.

Improper management of the risks could be catastrophic. As a trend that will continue to grow throughout 2014, companies need to be aware of the risks associated with BYOD. Further findings from the research indicate that nearly half of generation Y employees use their work phone, device, computer or tablet for personal use. As such, it is almost impossible to prevent people from bringing devices exposed to malware into the workplace. USB-ports, mobile devices, memory cards and Bluetooth connection hubs are just a few devices that could cause potential harm if policies are not engineered around them.

An alternative to BYOD is the adoption of a CYOD, (C)hoose (Y)our (O)wn (D)evice, approach, which hands back at least some control to the IT security team. By allowing employees to only choose from a specified range of devices, it makes it easier for IT to secure and manage corporate data while providing the option for all parties to reap the benefits mobility and BYOD brings.

CYOD bridges the gap between employee choice and the control for IT managers in securing the network. Integrating a mobile device management system will ensure that unapproved devices cannot get access to the corporate network and thus prevent corporate data from being exposed. It seems clear that the optimal choice for businesses should be the CYOD model, a model that will minimise the potential risk to an acceptable level, while still maintaining the flexibility employees would like to see in the modern day workplace.

Related News

  • Interviews

    Travel duty of care

    by Mark Rowe

    What duty of care do employers have for employees travelling for business? asks Chris Job, Director of Risk Management at Healix International,…

  • Interviews

    Forensic evidence

    by Mark Rowe

    Advances in forensic technology are enabling field level examiners to undertake link analysis and other key investigative techniques previously done in the…

  • Interviews

    Black market in degrees

    by Mark Rowe

    Jim Yip, Regional Marketing Director, Asia Pacific at Thales e-Security writes of the black market of degree certificates. Counterfeit degree certificates are…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing