Are BYOD programs a security risk?

31655 pts.
Tags:
BYOD
Consumerization
Security
According to a recent study by Ovum, 80% of corporate BYOD programs are 'inadequately managed by IT departments.' As more companies allow their staff to use their own computing devices to do work, they're struggling to address the programs that enable corporate control and guidance. How is your company controlling BYOD? Are they mitigating the security risks?

Answer Wiki

Thanks. We'll let you know when a new response is added.

*

Discuss This Question: 4  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • TomLiotta
    How is your company controlling BYOD?   Bizarrely at times (at my previous job). I had this laptop as a third system at my office. It has characteristics that I could use in testing specific network security elements. But company ops detected it eventually and had me take it home. They provided a company-owned laptop replacement. So far, so good.   But it was apparently okay if I used VPN from home to get the same level of access that I had in the office. In the meantime, because I was no longer directly attached to the company network, there was no possibility of company control over what the laptop was exposed to during non-VPN usage.   Tom
    125,585 pointsBadges:
    report
  • Harisheldon
    Working for the government, a BYOD is not even an option.  We use port security and any system that is plugged into that port and does not recognize it is immediately shut down and flags go up all over at NetOps.  If we have a visiting VIP who brings their laptop, they need to have a letter from their IA section with a report, NLT 30 days old, of the latest scan of that device.  For those that have to VPN from the road, they are issued a laptop and before they go on the road, their IT personnel must ensure that all of the latest patches are up-to-date on the system and that they can connect to the network via VPN.  So even mentioning BYOD is taboo around here.  When the USB's were shut down due to the transfer of trojan's and malware, you thought that the world had blown up.  People went about saying how we were stopping them from doing their job and preventing the mission from going forward.  It was crazy those first few days.  We just referred them to a message from the Pentagon and they still wanted us to turn them back on, insane.  Can't wait to see what is next, blocking the cloud???
    5,660 pointsBadges:
    report
  • Harisheldon
    As I typed in the last line to my post to the discussion, the people higher up that make the decisions have done just that, they have blocked the link to the Amazon cloud.  I just tried it yesterday.  So much for gaining access to files from home anymore and back to burning them to DVD.  God I love working for the government...LOL
    5,660 pointsBadges:
    report
  • Kevin Beaver
    I can honestly say, besides the few that use a true MDM solution and the handful of others that are properly implementing/enforcing ActiveSync security, most business I see have zero control over their mobile environments (devices and data).
    17,375 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following