Is BYOD Starting to Spell Out ‘S-N-A-F-U’ in Enterprise Security?
When did
the bring-your-own-device (BYOD) movement really start? Did it begin with
gadget lovers bringing their new toys into the office, or with people hooking
MP3 players into their corporate PC? Or did it only begin when employees
declined to use their corporate-issued phone or laptop? Either way, BYOD is an
evolving and unstoppable trend that is rather challenging to control no matter
how stringent a policy companies enforce in that regard.
This
brings us to the rather evident subject of security. Most organizations’
security teams have already understood that limiting BYOD is futile. Policing
it is resource-intensive, and counting on employees to do the right thing is
likely to be the root of disaster. Most organizations are working to enable
BYOD in the most secure way possible by allowing certain types of devices into
their network, enforcing policies, demanding certain mobile apps be downloaded,
imposing long password requirements for mobile screen locks or using a variety
of authentication schemes.
Comments
Post a Comment