News

Why Cool New Technologies and Devices Provide Another BYOD Headache

Tue, 26/07/2016 - 09:29
Disaster Recovery

BYOD is on the rise. We know this. You need a Bring Your Own Device Policy to make sure your employees don’t destroy your network. We know this too. But just when you think you’re ahead of the game, digital innovation springs yet another type of mobile device that opens yet another hole in your already porous firewall. Say what?

Streetwise lifestyle devices 

Taking a look at the Global Smart Wearable Lifestyle Devices and Services Market 2015-2019 report, analysts have projected an annual growth rate of 35.14% of smart wearable lifestyle devices. Corresponding services for such devices will grow similarly at 39.06%. We’re not even talking about smartphones and tablets. No, these are the pinnacle of digital design more along the lines of wearable real-time body-stats monitoring devices and other social media-oriented gaming and video sharing devices.
 
Consider the Samsung Gear and, more recently, the Apple Watch. These things are wonderful because they let you carry your phone like a fashion accessory – in a much smaller much more wearable format. They’re packed with functionality letting you interact on social media like you would normally do on a phone, all the while staying connected to the internet and now making calls too.

More wonder 

Also think of “augmented reality” and “gesture recognition”. Augmented reality lets you interact with your surroundings through a device that collects information on location or a specific item and “augments” it by super-imposing relevant bits onto the screen. These things are at the forefront of innovation and it’s going to pick up fast. Remember how we were so chuffed about that brick of a Nokia with its old-school 3-line LCD screen, and then suddenly we had touch screens and smartphones. With this kind of BYOD, life for the IT guys is going to get messy quick, depending on which side of the firewall you’ll be sitting.

So where’s the catch?

The risks in IT security haven’t gone away. The basic rules of protecting your BYOD environment are still the same:

  1. Secure your data.
  2. Tighten network security.
  3. Implement a BYOD policy.
  4. Use encryption.
  5. Look at MAM (Mobile Application Management) and MDM (Mobile Device Management).
  6. Separate personal desktops from business desktops on each device.
  7. Enforce multi-layered password protection.
  8. Configure “phone wipe” for lost/stolen devices.
  9. Enforce the use of the company Wi-Fi.
  10. Decide which devices are actually allowed on premises.

To illustrate how the industry is evolving, even Apple are already partnering with IBM to embrace some much needed security on their iOS-based devices in the form of MDM (although they’ve been reluctant to collaborate with third-party vendors in the past, trying to ensure their user experience is consistently wonderful without other’s meddling in it). MDM is on the rise and it would effectively allow employers to have some measure of control over what gets done on these devices while being at work.
 
Something else to look at is a crucial bit of technology referred to as the “phone wipe”. Here employers can ensure that lost or stolen data doesn’t end up in the wrong hands. Sure, this might be a bitter pill to swallow for employees but in the end, it covers both parties.

Secure your data 

As you can see “secure your data” is number one on the list when it comes to BYOD. Wiping a device that contains sensitive data is one thing, but making sure you still have the data is another – it is actually the most important. This means that should your network get breached if other measures fail to protect, your data is still protected. And should it fall into the wrong hands, if it’s encrypted, better still. Thieves won’t know what to do with it.
 
Carefully crafting a bring-your-own-device policy is no longer optional. It has become a necessity and making sure you have an up to date backup of your critical data, not negotiable.

Recent Articles

Redstor_Archiving_vs_Backup_blog Data Backup

Data Archiving vs Data Backup – What’s The Difference?

Data protection and management is vital to modern IT environments and organisations know this. Data protection regulations mandate the need for... read more

April 19, 2018
Redstor_Facebook_Fines_blog Data Management

Facebook, Fines, Data Protection Compliance And The GDPR

Much has been written about the ongoing data scandal surrounding tech giant and social media powerhouse, Facebook. As CEO and Founder Mark Zuckerberg... read more

April 18, 2018
Redstor_ITNation_blog Redstor

Redstor To Exhibit At IT Nation Europe For The First Time

Following a busy events programme at the start of 2018, Redstor will be taking part in this year's IT Nation Europe event from the 18th to the 20th... read more

April 12, 2018