BYOD: Good or Bad?

BYOD: Good or Bad?

BYOD: Good or Bad?

BYOD-Security

The Bring your own device or BYOD trend being touted by cloud computing as one of its most attractive features is actually causing concern to a lot of IT officers because of the inherent problems brought to the table by allowing company data resources off the premises. One of the biggest problems that can be encountered would be data loss or information leakage. These are the same repercussions as losing a company laptop a few years ago the potential for disaster because of losing vital company secrets is extremely high.

AccelOps Cloud Security Survey Report surveyed some 176 IT security personnel and they ranked BYOD as the top source for fear of incurring data loss and having the need for heightened data control. This is the traditional topic or cloud worriers and opponents of cloud computing which only helps in propagating the myth that cloud computing in not secure. ISC2’s January research shows that explicitly linked cloud computing to the creation of personal device policies. But the take away from the research is that companies who support BYOD have happier employees while also needing to increase their cloud security knowledge and skills. The same research survey shows that 78% of the participants consider BYOD as a “somewhat or very significant risk”.

While BYOD is certainly a highly appealing way to do things for the employee, it becomes rather a pain for employers. Part of this is because there is no proper standard in creating BYOD policies, and each company has to stumble and learn from their own mistakes, because as with all new things, few have explored it to catalogue best practices and create ad-hoc standard policies. When learning from other’s mistakes is not pretty much an option yet, companies have to become smart when approaching this nice little feature.

My two cents on the matter is that BYOD policies should be based around data control and logon security. Little to no data should be stored within mobile devices themselves that may be retrievable by those that get their hands on the device. If this is the case, data thieves have to login to the account on the stolen devices which makes it just a tad harder. This is where logon security comes into play. Multi- tier verification should be the way to go because common username-passwords can easily be stolen or even guessed. There should be further user authentication and verification, probably along the lines of facial or voice recognition or other forms of multi-tier verification devices.

By Abdul Salam

2 Responses to BYOD: Good or Bad?

  1. BYOD and virtual desktops are really a match made in heaven. Especially for SMBs who don’t have the resources to manage resources at a device level. Our service provider (solvco.com) does virtual desktops that end users can then log into from any device, creating a separation between personal and business use, plus virtualization is generally more secure, anyway.

  2. I think Bring-Your-Own-Apps (BYOA) in going to become a very strong subset of BYOD, a good example is that many hospitals don’t have big MDM systems, but use the Tigertext apps for HIPAA compliant secure texting, a clear example of BYOA. I think another trend is Build-Your-Own-App (BYOA?), in which companies build a data securiy app to help employees work with BYOD more securely. The fact that Tigertext now has a secure texting API called TigerConnect that companies are intigrating into thier own data security apps, is very telling in that companies are taking this option seriously.

Comic
Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

What Futuristic Tech Will You See In Your Lifetime?

What Futuristic Tech Will You See In Your Lifetime?

Futuristic Tech The world and what people can do is increasingly being driven by technology. It has already shaped the world we live in, but over the next few decades it is set to shape the world in ways that we can barely imagine. There have already been some great leaps in IoT technology recently,…

The Lighter Side Of The Cloud – Hiding Spots

The Lighter Side Of The Cloud – Hiding Spots

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…