Quantcast
Channel: Security Boulevard
Viewing all articles
Browse latest Browse all 37364

BYOD: Why Bring Your Own Device Doesn’t Spell Disaster for Your Network’s Security

$
0
0

by Tara Savage, Senior Marketing Manager, BT Global Services

This holiday season was brought to you by the letters B.Y.O and D.  Those four letters spell a major shift in the technology world, one which is going to have a big impact on businesses this month.

It goes without saying that the number one holiday gift this year will be tablet computers and smart phones and that the vast majority of people will want to bring their new device to work with them when they come back to work.  In other words, they’ll be bringing their own devices through your business’s front door and wanting to log on to the corporate network.

Before panic sets in at the thought of hundreds of unsecured devices wreaking havoc on your well managed network, take a step back and have a look at the big picture.

BT’s Ray Stanton and Jeff Schmidt have been talking to the media about why the panic over BYOD is much ado about nothing and that the benefits of enabling workers to use mobile devices far outweighs the risks that are commonly associated with them.

From Jeff’s perspective tablets enable worker productivity and enhance customer satisfaction. As long as strong authentication is enabled and device-wipe capability is part of the tablet’s set up, data is likely more secure than if it was sitting on a desk-top computer in an office park.

In a recent article on searchsecurity.com Ray pointed out that securing mobile devices is very similar to securing lap tops, something that companies have been doing successfully for many years now.   He says: “[i]f the policy is to allow tablet use, then introduce the same security policies and enforcement as you would on a laptop computer”.  It’s irrelevant if it is your own device. If users are accessing corporate data, the rules revert to the corporate policies, irrespective of what they have accessed it from.”

Ray points out that the other keys to success are user education to make sure employees are aware of policies and understand both why they are in place and how to comply with them.  Ray is particularly impressed with Good Technology from Good Dynamics which have some excellent platforms for multi-end user environments to manage and secure mobile devices.

And, as Martin Brown, another of BT’s security experts has said in his Twelve Tips for Christmas: “Make sure you enable a password set-up immediately and run security updates until there are no more flashing icons.  Just because it’s new doesn’t mean it’s secure!”

 



Viewing all articles
Browse latest Browse all 37364

Trending Articles