Saturday, May 18, 2019
The Byod Security Risk
The BYOD Security Risk Introduction The entryway of wandering(a) whatchamacallums in the workplace has been on the rise and t here is no denying that these pulls are transforming how companies do business. This has introduced the BYOD or Bring Your Own Device model in the workplace and its becoming much popular all(prenominal) day. BYOD is a policy that accepts employees bringing personally owned alert devices to their workplace and using them to access beau monde selective information such as email, file servers and databases as well as their personal applications and data.But as data transmissions increase with these devices so does the chances of them being hacked and the burden of successfully managing the busy devices is laid upon the IT departments. One of the real rudimentary issue with BYOD and ready aegis is the that people in IT, compliance and internal audit arent willing to make their necks step to the fore and try to enforce their mobile security policies or enforce an effective Enterprise Mobility management solution. First Section Title goes hereEnterprise Mobility Management foundation be described as the set of people, processes and applied science focused on managing the increasing array of mobile devices, wireless networks, and related services to enable unspecific use of mobile computing in a business context. Enterprise Mobility can be upset down into 2 parts Mobile Application Management and Mobile Device Management. In on the spur of the moment Mobile Application Management or MAM is the use of secure application to connect employees to puzzle out data and the application secures the data from other apps on your phone.Mobile Device Management or MDM takes a centralized attack and installs an application on the mobile device and the software allows you to use all your native apps to access Crop data and email and is managed from a centralized server. Both these examples of Enterprise Mobility Management have their ow n pros and cons simply provide solid solution to the mobile security issues in the workplace. Second Section title goes here With the increasing need for mobile devices in the workplace and although ost employees have embarrassed it most IT departments are non ready to meet the security demands a mobile device network can put on a company. Lets look at this watch where 4,000 employees in a verity of industries across 16 countries were surveyed and half of them use their mobile devices for work. CIOs and IT departments want to embrace the BYOD model to help disc all over their companys mission however they want to do it securely. At this point the secret is out BYOD is a real issue and IT departments need to strategize now for an effective enterprise mobility management solution.Its clock to ignore the standard approved device list, locking down corporate apps, and enforcing mobile device policy. The bump of a CIO or IT department failing to implement a suitable solution for their mobile device network is very real. Its time to explore new ideas to effectively manage a mobile device network via the Enterprise Mobility platform. The invasion of mobile devices into the workplace is going to go past weather industry leaders want them to or non, and smarter companies are looking to deploy Enterprise Mobility strategies originally they are overrun.Third Section title goes here Adapting security and management for the new generation of mobile devices is move out to be a huge corporate challenge. The Company Thomson Reuters like many companies is struggling to comment which enterprise mobility management and security systems for their mobile device network consisting of mostly IPads and IPhones. Thomson Reuters has introduced the BYOD approach to its users to but not without a signed document requiring employees to surrender their device to IT if necessary if detection of negligent use.The problem with BYOD is that menses IT, compliance and internal audi ts departments need to Get With It and enforce their mobile security policies. The threat of a security breach with mobile devices is real and large companies need to realize it and find the balance between usability and security. And its not just large companies and corporations that are being affected the BYOD model or the user of mobile devices in the workplace. Small business in the last several years and most businesses found mobile devices useful.But few small businesses are a where of the significances of an adequate mobile device management solution. A survey was conducted by CDW of 753 mobile device users and IT professionals from July 2012 to June 2012. The survey found that 79% of the small businesses deployed smart-phones to some of their employees but 67% of IT managers in the survey are unfamiliar with Enterprise Mobility Management software. The use or knowledge of mobile device management is virtually non-existent in small businesses.Fourth Section title goes here No t tho is the lack of preparation by IT departments a problem in posing a security risk, but the devices and the applications on them pose a security risk. Bit9 did a research study analyzing the security authorizations of Androids 400,000 apps and found over 100,000 posed a security risk. 72% of them use at least one high-risk permission and 26% access personal data such as gps location, email, and contacts information.Even some basic apps like paper apps ask for gps data and should be a red flag to users. Having these apps on your Android mobile device along with company date could be a serious problem. Especially since the average user doesnt read the information pertaining to the app their installing. Fifth Section title goes here Furthermore the mobile devices themselves can be lost or stolen and if the data is not encrypted it can be accessed. In less than two years, from family 22, 2009 through May8, 2011, the U. S.Department of Health and Human Services (HHS) Office for Civ il Rights (OCR) indicates that 116 data breaches of 500 records or more were the direct result of the loss or theft of a mobile device, exposing more than 1. 9 cardinal patient ofs PHI. Sixty-four percent of physicians own smartphones and 30 percent of physicians have an iPad, with another 28 percent prep to vitiate one within six months, according to a recent Manhattan Research study. If one of these devices with patient information was lost without any type of enterprise mobility management software the patient data can be exposed.Conclusion In conclusion businesses can save money by letting employees buy their own devices, IT departments need to implement secure, efficient ways to let employees, contractors and guests gain access to the corporate network, term protecting data and applications. It takes a proactive approach to solve this BYOD problem and IT departments need to educate themselves on an enterprise mobility solution as mobile devices in the workplace is only goi ng to play a larger role. Being able to manage and secure your mobile device network should be a priority of an IT Department.