Security in a Bring Your Own Device World

By Lauren Fritsky

The cyber security risks inherent in the Bring Your Own Device trend are ever-present and rapidly multiplying. Sometimes the threat comes from innocently logging into an unsecure wireless network. Other times, a phone is dropped on the sidewalk or left at a café where it may fall into unscrupulous hands. In other scenarios, employees knowingly compromise corporate data and put their company’s integrity, financial stability and reputation at risk.

So how do you allow mobility to sweep through your organisation’s doors without putting everything and everyone inside it at risk? Richard Byfield, managing director of Datacom’s Technical Security Services (TSS), says achieving a more secure Bring Your Own Device program requires organisations to:

•    Centrally configure, monitor and manage smartphones and tablets
•    Ensure mobile infrastructure, devices and apps start, and remain, in a trusted and compliant state
•    Protect devices from corporate data loss while preventing security breaches and non-compliance scenarios
•    Securely deploy and manage corporate apps, data and documents
•    Mitigate the risks associated with devices operating in a compromised state or within an environment that could expose it to threat
•    Address regulatory compliance and produce up-to-date auditable compliance reports

Byfield is speaking on Bring Your Own Device cyber security at a live panel for AusCERT2012, hosted and streamed by ZDNet, in Queensland beginning today and ending Friday. AusCERT event organisers handpicked expert speakers from around the world to discuss the various security risks related to mobility and the best solutions being used to mitigate them.

Read our other posts on mobility and cyber security:

Respecting Privacy: Keeping Data Confidential in the Cloud

Mobile Employees and Cyber Security Go Hand in Hand

A Bring Your Own Device User Policy Checklist

3 Steps to Managing Bring Your Own Device at Your Business

The Headaches Inherent in the ‘Consumerisation of IT’

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s