By Lauren Fritsky
The cyber security risks inherent in the Bring Your Own Device trend are ever-present and rapidly multiplying. Sometimes the threat comes from innocently logging into an unsecure wireless network. Other times, a phone is dropped on the sidewalk or left at a café where it may fall into unscrupulous hands. In other scenarios, employees knowingly compromise corporate data and put their company’s integrity, financial stability and reputation at risk.
So how do you allow mobility to sweep through your organisation’s doors without putting everything and everyone inside it at risk? Richard Byfield, managing director of Datacom’s Technical Security Services (TSS), says achieving a more secure Bring Your Own Device program requires organisations to:
• Centrally configure, monitor and manage smartphones and tablets
• Ensure mobile infrastructure, devices and apps start, and remain, in a trusted and compliant state
• Protect devices from corporate data loss while preventing security breaches and non-compliance scenarios
• Securely deploy and manage corporate apps, data and documents
• Mitigate the risks associated with devices operating in a compromised state or within an environment that could expose it to threat
• Address regulatory compliance and produce up-to-date auditable compliance reports
Byfield is speaking on Bring Your Own Device cyber security at a live panel for AusCERT2012, hosted and streamed by ZDNet, in Queensland beginning today and ending Friday. AusCERT event organisers handpicked expert speakers from around the world to discuss the various security risks related to mobility and the best solutions being used to mitigate them.
Read our other posts on mobility and cyber security: