How BYOD Affects Security In The Cloud

How BYOD Affects Security In The Cloud

Since bringing your own device – also known as BYOD – is starting to become widely adopted by companies of all sizes, a lot of contradictory discussions have appeared around this topic. Eliminating hardware purchasing and maintenance is a great advantage for reducing company costs. Employees also benefit from this new trend the most because they are free to choose what device to use to fit their personal and business needs.

However, the main challenge with BYOD is securing a wide variety of devices. Therefore, enterprises have turned to SaaS, solutions because they can make data more secure and reducing the likelihood of user error. Google Apps allows users to use documents or emails, but none of this data is stored on the hardware device, so risks to physical data loss decrease significantly.

Another important aspect to consider is user error. Taking into account that 63% of users losing data is attributed to user error. If the employee has the chance to use the device they feel more comfortable and familiar with, it would most likely lead to less mistakes.

To make sure that cloud computing and BYOD successfully co-exist in enterprises, support processes have been defined by many organizations. These help employees to work from a mobile device within the corporate network securely.

Here are the main topics you should consider so BYOD will not affect security in the cloud:

– create rules for accessing corporate applications
– address use policies that are acknowledged by all employees
– develop policies that apply in the situation when a employee changes its job and the company needs to have access to the data
– implement tools to identify and reduce breaches from being introduced into the organization

Employees appreciate the chance to choose the device they’ll work from. This gives them more freedom, more control and their motivation will increase considerably, which is an added benefit for the company. Before adopting BYOD policies within your company, make sure you understand both the benefits and the shortcomings of this trend and take the most appropriate decisions according to your business needs.

By Rick Blaisdell / RicksCloud

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…