Making BYOD Work For You
February 24, 2014
During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand to use employee-owned devices for work is forcing security to compete with other equally important activities.
A number of factors contribute to the diminished regard for security:
Lack of awareness: IT groups may not be aware of the number of mobile devices that are connecting to their networks. A survey estimated that 69% of employees used smartphones for work while their respective IT groups said 34% did so.
Increased workload: Unlike company-issued laptops, employees’ smartphones require more from IT groups because IT administrators need to treat and configure each device and operating system version differently. As a result, IT groups may only enforce minimal security.
Technical support prioritization: Device-carrying employees demand that IT groups make their devices work, forcing IT groups to deprioritize security in favor of providing technical support.
Mobile OS updating difficulty: IT groups’ jobs are not made easier by the open nature of the Android™ OS and mobile OS providers’ weak vulnerability handling and remediation processes. Waiting for patches can take weeks; fully deploying those takes even longer. Knee-jerk mobile device management (MDM) solution purchases: IT groups may be tempted to buy an MDM solution that may be inappropriate to their specific environments and can negatively impact their security.
Informal adoption: In some cases, enterprises may informally encourage the BYOD trend to please their employees. They may, however, not have written usage guidelines or implemented best practices.
The introduction of employee-owned devices to workplaces has been acknowledged in order to increase employee productivity and satisfaction, business agility, and provable cost savings. Risks to security and data should, however, also be closely examined.
Find out more on this paper.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: Trigona
- Steering Clear of Security Blind Spots: What SOCs Need to Know
- Understanding the Kubernetes Security Triad: Image Scanning, Admission Controllers, and Runtime Security
- Preempting Threats to Connected Cars: The Importance of Cybersecurity in a Data-Driven Automotive Ecosystem
- Your Stolen Data for Sale