Today, just like every day, we in the IT Organization are faced with the new challenges created by BYOD in the enterprise. Managing change is what we are all about and having an ITIL-based ITSM solution will help keep the IT wheels rolling along.
I have written several blog posts on BYOD in the past few months. Some have centered on policies and legal issues, others have been focused on Mobile Device Management or MDM. Today I want to once again write about the number 1 concern with BYOD - security.
In the 2012 Mobile Security Survey from Information Week, they analyze the mobile security technology trends and strategies from 300+ North American organizations. 86% either allow or are adopting policies to allow employees to use BYOD for business purposes, making the companies vulnerable to a number of security risks.
If your IT Organization is like most, then you are trying to keep up with the constant change and mitigate the risks to the enterprise involved in change implementation. Download the free Change Management offer below.
What security risks?
The Information Week survey found that:
48% of respondents indicated that employees within their organizations had their mobile devices lost or stolen in the past year, with 12% of those cases requiring public disclosure, causing inevitable harm to the business.
IBM's Chief Information Officer, Jeanette Horan was interviewed in a recent article IBM Faces the Perils of Bring Your Own Device. According to Horan, who oversees all the company's internal IT use, BYOD has created new challenges for her department of 5,000 people. The employee owned devices are full of software that IBM doesn't control. When IBM surveyed employees, many were "blissfully unaware" of what popular apps could be security risks.
BYOD is here to stay, so the IT Organization has got to find ways to control the security risks inherent in the Consumerization of IT. The first step is BYOD policy creation that addresses the issues your enterprise faces. You can read more about resources for creating policies around BYOD in a previous post.
In his post, 10 ways to reduce security headaches in a BYOD world, Jack Wallen makes a very concise list of thing you can do to control the security of the BYOD in your enterprise.
Of the top 10, here are the 4 things you need to do today!
1: Secure your data
2: Tighten your network security
3: Implement a BYOD antivirus/anti-malware policy
4: Mandate encryption
The next 5 are necessary steps in the process. #10 however, will be the biggest challenge of all for the IT Organization regarding BYOD:
10: Limit device support
Good luck on that one. Another quick resource from Jack Wallen is Protect your business data with five BYOD security apps. He introduces you to some of the apps that you will need to consider when you begin to secure your enterprise after the BYOD explosion.
Again, we in the IT Organization are here to support the enterprise, but once the floodgates of Consumerization are opened, we need to react to the new normal. Get your policies in place, get your security measures tightened up and let ‘em rip.
Flickr Image by 00dann