Is BYOD Starting to Spell Out ‘S-N-A-F-U’ in Enterprise Security?

When did the bring-your-own-device (BYOD) movement really start? Did it begin with gadget lovers bringing their new toys into the office, or with people hooking MP3 players into their corporate PC? Or did it only begin when employees declined to use their corporate-issued phone or laptop? Either way, BYOD is an evolving and unstoppable trend that is rather challenging to control no matter how stringent a policy companies enforce in that regard.

This brings us to the rather evident subject of security. Most organizations’ security teams have already understood that limiting BYOD is futile. Policing it is resource-intensive, and counting on employees to do the right thing is likely to be the root of disaster. Most organizations are working to enable BYOD in the most secure way possible by allowing certain types of devices into their network, enforcing policies, demanding certain mobile apps be downloaded, imposing long password requirements for mobile screen locks or using a variety of authentication schemes.


How Can BYOD Compromise Security? 

Read the original blog here

Comments