Security Risks of BYOD

7:15 PM
Security Risks of BYOD -

More and more consumers to own smart phones or tablets and put to work. Some companies adopt the "bring your own device" trend or "BYOD" without fully understanding the implications of security risks.

When employees use their mobile devices badly, they put their companies at risk for data breaches. This includes leaving a lot of sensitive data on devices, which can open the door to data leakage and other issues.

current security measures are lagging behind the increase in mobile device utilization in the field of business.

a study by Glasgow University has not only shown that many sensitive company information has been left on the handsets, but personal information and was left on, put employees as well as society at risk in case of violation.

This small study shows a clear need for guidelines and improving policies governing the use of personal smartphones devices and employee safety devices. This becomes even more relevant as companies are increasingly turning to cloud storage for data.

unauthorized software-as-a-service (SaaS) applications used by employees, is widespread, according to a McAfee study. These applications are not approved by the company's IT department. Employees can easily bypass the IT department using the cloud. The study showed:

  • Over 80 percent of survey participants reported using SaaS unauthorized applications
  • About 35 percent of SaaS applications used on work are not approved
  • Approximately 15 percent of users had a security problem using SaaS.

employees may not realize that their chosen SaaS applications are poorly controlled. These employees are not malicious; they are just trying to be more efficient. Companies must find the right balance to protect themselves while enabling employees to use applications for enhanced productivity.

An ideal situation would be to monitor SaaS applications and apply policies that inhibit the ability of employees to be productive. [

A recent Forbes article caught my attention and the author's solutions make good business sense

Six solutions

1) XenMobile - This allows it to secure and manage smartphones, data and applications, and establish policies based on smartphone ownership, location or status. Users can easily access the web, email, business applications and documents with a single click on a mobile device

2) Airwatch -. This system provides mobile device management applications, content and e-mail, to oppose mismanagement inadvertently smartphones by employees (eg, store documents in vulnerable locations)

simply enter the username and password. Airwatch will wirelessly and automatically configure all settings, applications, security policies and according to the role of the worker in the company

3) MobileIron -. This system manages and secures applications, devices and content, ideal for companies that support the BYOD program. personal content can be separated from corporate content, the protection of personal data of the employee

4) good dynamic platform for secure mobility -. This is a BYOD program that maintains employee productivity while zeroing on safety. Personal data is partitioned from business data to protect programs such as e-mail

5) Samsung Knox -. This system is for Android devices, management with a seat tiered approach. A network will be protected against malware, hacking, viruses and unapproved access

6) Protect your BYOD on wireless networks. - Use VPN if you are on a wireless handheld device. Hotspot Shield VPN is free, although its paid version is an expanded and faster. Hotspot first launch before using your laptop PC, iPad or iPhone to connect to Wi-Fi as free public services at the airport or at a cafe or hotel.

The totality of your browsing session on the Web will be protected. All your connections are guaranteed. This will eliminate some of aggravation for your company's IT department.

Robert Siciliano on Google+

Previous
Next Post »
0 Komentar