Magazine article Information Management

BYOD Brings Security Challenges

Magazine article Information Management

BYOD Brings Security Challenges

Article excerpt

The bring-your-own-device (BYOD) trend poses seri- ous security challenges for enterprises. A 2012 Trend Micro survey report "Mobile Consum- erization Trends & Perceptions" revealed that nearly half of en- terprises surveyed that allow employee-owned devices to con- nect to a company's network have experienced a data breach. Fur- thermore, 86% of the IT decision makers from the United States, United Kingdom, and Germany reported that smartphone data security is their number one con- cern when consumer devices are connected to corporate networks.

According to an October 13 New York Times article "Bolster- ing a Phone's Defenses Against Breaches," a handful of technology companies are trying to capitalize on the BYOD trend that people in charge of securing corporate net- works say has become their biggest headache. In the past, the author wrote, they could mandate that employees use company- approved BlackBerry smartphones, which came with a tightly controlled network. However, with BlackBerry's future un- certain and an increas- ing number of employees requesting to use their iPhones, iPads, and Android-powered devices at work, IT managers have been forced to consider alternatives - and to deal with those alternatives' security threats.

Data security managers are struggling to keep tabs on sensitive information as employees import data to their personal devices and download mobile apps that have access to corporate assets. Experts and threat researchers warn that these applications have little or no safeguards. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.