Sign Up For The Free Newsletter

June 19, 2012

June 19, 2012 Bring Your Own Device (BYOD) Is A Double Edge Sword

BYOD, Bring Your Own Device, the concept of businesses allowing their employees to use their own personal devices on the corporate networks. Whether companies like it or not, this wave is coming and IT and Security departments need to start preparing on how they are going to handle this.

There are many reasons why a company would consider a BYOD approach and some are already beginning to toy with the idea. The smaller the company the better chances are that BYOD will be in place or coming shortly.

It Starts With The iPhone


In my experience BYOD is starting with iPhones. It's not for the reason you think. Personal iPhones are being allowed to touch corporate networks because Blackberrys are being phased out, primarily because of the high cost of hosting a Blackberry Enterprise Server. Companies are changing their tune and allowing iPhones to be used as the mobile email device. But iPhones and iPads are not yet ready for prime time corporate use, yet.

Cost Does Not Outweigh The Cost


The heading here is confusing. Cost does not outweigh the cost. There are many types of cost and companies riding the wave of BYOD mentality are not totally thinking through what exactly this means. Most companies are only looking at the cost savings in hardware and software. BYOD allows the company to not have to buy hardware for an employee, software to run on it, and the cost to support the device. But there comes a larget over all cost if BYOD is not looked at as more than a simple device replacement. If it's done wrong, the cost of the consequences could exceed 100 new laptops.

Everything Needs To Be Restructured


BYOD is inherently dangerous in my opinion but this is coming and employees are going to be looking for it. At the current level of mobile OS technology and features the devices themselves are not quite ready for a BYOD use. BYOD means that the employees are going to use their devices for their own personal use as well which means companies need to make sure there is a clear cut dividing line between company data and personal data. iOS for example really cannot do this, even with in the apps, there still is no way to split a personal profile from a company profile. So how do you control this?


First, companies need to move back to a client-server approach where the devices are accessing server applications, working on data, but nothing ever gets placed on the devices. Second, new policies and procedures need to be created from what users can install and cannot install to how the devices should be used, such as do not text while driving. Third, the ability to forcibly wipe the device if and when it gets lost. 


In order to protect the company data, which should be the first and foremost priority, the policies that will be applied in a BYOD environment will make it that the employees won't want to have their devices manipulated or controlled by their IT departments. 


Who Supports It?


If the employees are participating in a BYOD program, who supports the devices? Unless you lock down what types of devices and OS' you allow, is it going to be expected that the company's IT department is going to be called for device support or does that responsibility shift back to the employee since they own the device? How do you make sure that patches and updates are up to date? How to make sure they security best practices are being used?


IT departments have full control and authority over the company's security setups, networks, and access controls. BYOD brings a new worry. A worry about each individual user's home network and other networks they may connect to. A controlled device can have two factor authentication, VPN, certificates, and all the best practices in place to ensure security. A lot harder to do with a device the company does not own.


Employee Convenience Should Not Be A Priority


BYOD has more benefits for the user's than the company that allows it. So what if the employee's have more flexible options if the company does not have the proper protection's for the data? The inability to protect data should stop thinking about BYOD in any institution. Expanding the accessibility of corporate networks when a majority of them are barely locked down properly for owned assets is a disaster waiting to happen. The industry, IT departments, and user's are not at the maturity level (procedurally speaking) to attempt BYOD approaches. Things are too segmented and the devices OS themselves are not built or designed for that multi-use or have the proper security controls in place natively.

Really at the end of the day would a regular user want their iPad their 3 year old uses to watch Caillou episodes implemented with two factor, hard token, certificate authentication in place?

End of Line.

1 comments:

hammondjm said...

One point: there are software based options for 2 factor auth that can strengthen access to corporate resources without negatively impacting or complicating the end user experience. Hard tokens and certs aren't the only options. That being said, I agree with your assessment that security of corporate data on BYOD devices is a big problem for any cororation allowing this.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Laundry Detergent Coupons