BYOD: Good or Bad?

BYOD: Good or Bad?

BYOD: Good or Bad?

BYOD-Security

The Bring your own device or BYOD trend being touted by cloud computing as one of its most attractive features is actually causing concern to a lot of IT officers because of the inherent problems brought to the table by allowing company data resources off the premises. One of the biggest problems that can be encountered would be data loss or information leakage. These are the same repercussions as losing a company laptop a few years ago the potential for disaster because of losing vital company secrets is extremely high.

AccelOps Cloud Security Survey Report surveyed some 176 IT security personnel and they ranked BYOD as the top source for fear of incurring data loss and having the need for heightened data control. This is the traditional topic or cloud worriers and opponents of cloud computing which only helps in propagating the myth that cloud computing in not secure. ISC2’s January research shows that explicitly linked cloud computing to the creation of personal device policies. But the take away from the research is that companies who support BYOD have happier employees while also needing to increase their cloud security knowledge and skills. The same research survey shows that 78% of the participants consider BYOD as a “somewhat or very significant risk”.

While BYOD is certainly a highly appealing way to do things for the employee, it becomes rather a pain for employers. Part of this is because there is no proper standard in creating BYOD policies, and each company has to stumble and learn from their own mistakes, because as with all new things, few have explored it to catalogue best practices and create ad-hoc standard policies. When learning from other’s mistakes is not pretty much an option yet, companies have to become smart when approaching this nice little feature.

My two cents on the matter is that BYOD policies should be based around data control and logon security. Little to no data should be stored within mobile devices themselves that may be retrievable by those that get their hands on the device. If this is the case, data thieves have to login to the account on the stolen devices which makes it just a tad harder. This is where logon security comes into play. Multi- tier verification should be the way to go because common username-passwords can easily be stolen or even guessed. There should be further user authentication and verification, probably along the lines of facial or voice recognition or other forms of multi-tier verification devices.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

2 Responses to BYOD: Good or Bad?

  1. BYOD and virtual desktops are really a match made in heaven. Especially for SMBs who don’t have the resources to manage resources at a device level. Our service provider (solvco.com) does virtual desktops that end users can then log into from any device, creating a separation between personal and business use, plus virtualization is generally more secure, anyway.

  2. I think Bring-Your-Own-Apps (BYOA) in going to become a very strong subset of BYOD, a good example is that many hospitals don’t have big MDM systems, but use the Tigertext apps for HIPAA compliant secure texting, a clear example of BYOA. I think another trend is Build-Your-Own-App (BYOA?), in which companies build a data securiy app to help employees work with BYOD more securely. The fact that Tigertext now has a secure texting API called TigerConnect that companies are intigrating into thier own data security apps, is very telling in that companies are taking this option seriously.

Personal Space And The Internet of Things (IoT)

Personal Space And The Internet of Things (IoT)

The Internet of Things (IoT) There is a long time concept of the personal area network or PAN. For all intent and purposes this is the maximum distance a Bluetooth device can move away from the host and still be functional. As I read the many wonderful pieces on the explosion of IoT and wearable…

Managing Cloud Applications Among The Business Regulations

Managing Cloud Applications Among The Business Regulations

Managing  Cloud Business Regulations Cloud applications must be managed in a way that complies with the many different government standards in the United States. As more cloud applications are being implemented in businesses of every industry, companies need a way to ensure compliance. Some of these regulations include the Health Insurance Portability and Accountability Act (HIPPA),…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities I have written two recent posts here on CloudTweaks about drones. The first, ‘The Pizza Delivery Drone’, was a somewhat comical look at what possibly is to come with future drones. The second was a look at the more immediately possible concept of a modular drone.  Modular drones are capable of supporting…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

An Old Recurring Revenue Model Gains New Converts

An Old Recurring Revenue Model Gains New Converts

An Old Recurring Revenue Model Due to a range of market forces, a recurring revenue model that’s been used for decades in industries such as airplane manufacturing is undergoing a resurgence. Widely referred to as outcome-based pricing, output-based pricing, and performance pay, it offers companies a compelling way to stand out in a crowded field.…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor