CIO – IT Decision-Makers says Embrace BYOD or Be Left Behind
Dark Reading – Avoiding IAM’s Biggest Blunder
Network World – Are federal agency workers going rogue with personal devices?
SearchEnterpriseWAN – Preparing for a disaster: When remote employees overload your VPN
Posts Tagged ‘BYOD’
What We’re Reading: Week of 1/21
Posted: January 25, 2013 in HighlightsTags: BYOD, IAM, identity access management, identity management, mobile, remote access, VPN
What We’re Reading: Week of 12/31
Posted: January 4, 2013 in HighlightsTags: 2013 predictions, BYOD, IPv6, Mobile Security, passwords, security risks, VPN
Readers’ Poll: What Solutions Should Lead the Charge for Enhanced Network Security in 2013?
Posted: December 28, 2012 in Readers' PollTags: BYOD, malware, Microsoft DirectAccess, Network Security, remote access, trojans, VPN
2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments.
What are the Biggest Risks of BYOD?
Posted: December 18, 2012 in Expert Q&A, IT policy, MobileTags: Bring Your Own Devices, BYOD, control, personal identifiable information, privacy
*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWAN.com.
Question: Our remote workers are entering the workplace with their own mobile devices and want to connect to our corporate resources. I want to allow them to do this, but before I do, I want to know the biggest risks of BYOD.
The biggest risks for enterprises that allow bring your own device (BYOD) environments are control and privacy. Deploying and enforcing security controls is typically more difficult on personal devices for two reasons. First, ownership of the device establishes a control mentality from the owner’s point of view. Second, restrictions on personal data or content, in general, are more difficult to argue from a BYOD policy standpoint. The most critical aspect is that companies must ensure they observe the protection of the users’ personal identifiable information (PII).