Complexities of securing BYOD

The ICT industry has long been an environment in which the merits of different technologies are robustly debated. But as cloud takes hold, that’s changing.

14 March 2014

The idea of encouraging workers to bring and use their own personal mobile and computing devices in the workplace may appeal to the bean-counters. However, such a strategy can be fraught with challenges, for example managing what data and apps are present on the device and ensuring that sensitive business information is adequately protected from loss or theft of the devices concerned.

But perhaps the greatest threat is from the installation of personal apps and the less than remote possibility that employees might fall prey to social engineering and inadvertently download malicious apps to their devices. Those apps could theoretically then have full access to the corporate network and data resources.

ITWeb Premium

Get 3 months of unlimited access
No credit card. No obligation.

Already a subscriber Log in