BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence
90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner. On top of that 90% of the smartphone market will be either a samsung or ios device, leaving blackberry, windows phones, LG and HTC etc to fight over the remaining 10%!!
!! WHAT DOES BYOD MEAN? Bring your own device, or BYOD, is a disruptive phenomenon where employees bring non-company IT into the organisation and demand to be connected to everything. Without proper accountability or oversight.
A new Gartner report predicts that by 2016 about 20 percent of companies will ultimately fail to find the proper balance between these dueling priorities. "Given the control that IT has exercised over personal computers by developing and deploying images to company-managed PCs, many IT organisations will implement strong controls for mobile devices," Ken Dulaney, a Gartner vice president, said in the report.!
THE RESULT!!! Employees are becoming sensitive to giving IT organisations access to personal devices and demanding solutions that isolate personal content from business content and restrict the ability of the IT organisation to access or change personal content and applications.
The fact that 15 percent of mobile-device users store their password details personal and business alike on their smartphones and that one in three don't use a PIN or password to safeguard access to their devices makes life even more difficult for IT managers straddling the line somewhere between Big Brother and Mr. Magoo." "Whether via formal BYOD programs, or just via devices coming in the back door and being configured to access corporate systems, the use of consumer technologies in the work environment presents a threat to IT control of endpoint computing resources," Dulaney added.
BYOD forces you to wrestle with three key operational challenges:
Governance & Compliance! BYOD could cause you to violate rules, regulations, trust, intellectual property and other critical business obligations.! Mobile Device Management! You need to manage growing workforce expectations around mobility. Your employees use many devices and they expect to use any device or application anytime, anywhere.! Security! If left unmanaged, BYOD can lead to loss of control, impact your network availability, and cause data loss. You need the right network access strategies and policies in place to secure your environment.
Mobile Device Management" You need to manage growing workforce expectations around mobility. Your employees use many devices and they expect to use any device or application anytime, anywhere.! What strategies are you using to manage the consumer invasion of mobile devices? You need to help manage cost and risk, meet the goals of the business and keep employees happy. It's a tall order.! Learn how demands for mobility outpace the ability of your enterprise.! User Expectations: Consumerisation of IT is winning. Can I find a way to set business rules for BYOD configurations without frustrating my users?! Cost: How much money do I need to reserve for new IT investments to support BYOD programs? How do I contain my costs?! Tools: Flexible ways to manage it all. What tools are available to manage and secure company information assets in the BYOD world? How many tools do I need? Can I recycle my company PC tools? Must I resort to the "honour system"?
Security" The key to a secure device is having a well-managed device. How should you secure your environment? How much management is enough?! If left unmanaged, BYOD can lead to loss of control, impact your network availability and cause data loss. You need the right network access strategies and policies in place to secure your environment.! Data Leaks: Sensitive information loss is a certainty. How can I ensure that company data is in the right place at the right time, encrypted and ultimately deleted according to my business rules?! Network Protection: Patch releases, identity and audit management, and more. What access controls will I need to decide which devices can open a VPN or connect an employee to the company Wi-Fi? Do I want to put incompletely unmanaged devices on my LAN?! Stolen Devices: Devices are too easy to lose. Loss and theft statistics are staggeringly high, and not just usinesses will choose and use mobile technology, services and tools to support customers and employees.
DID YOU KNOW?! By 2016, 20% of enterprise BYOD programs will fail due to deployment of mobile device management measures that are too restrictive.
! How can you ensure that your employees aren't really bringing-their-own-demons into work, that you - the IT Manager -now have to deal with?
Here are the pros:! Productivity is up. Especially outside of normal working hours. 70% of employees with smart phones regularly check their work email account when they're "off the clock," so to speak.!! Bring your own device is tied to increased employee satisfaction. Employees want to be mobile, want to use their Androids to check their email and their ipads to access the same files they would if they were working from their office laptop. But they don't want to sacrifice the perks associated with employer-provisioned devices, like IT support or secure wireless coverage.
Here are the cons:" You got a sea of corporate data now at the mercy of the employee. So what happens if their phone gets stolen or dropped in the swimming pool- who is responsible for replacing it? What if the employee downloads a malicious app that compromises company data? What happens to all that information when an employee leave the company... it just walks out with them?! All of a sudden you have personal photos, bank accounts, and social networking sites mixing with proprietary company files, personal information about employees, financial reports, presentations, emails... If that information falls into the wrong hands and is then used to commit identity theft or wreak other sorts of havoc, the company could be held liable.
Fact 1
Over 50% of smartphone and tablet users do not password protect their devices and more than 2/3 of users are perpetually logged into their applications.
Fact 2
According to backgroundcheck.org, $7 million worth of phones are lost every day around the globe. 2/3 of phone losses happen between 9 p.m. and 2 a.m.! How many phones are lost or stolen in London everyday??!
Fact 3
! 66% of employees who use their personal devices at work currently say that their organisation does not have a BYOD policy.
Fact 4
! The average cost of a corporate data breach is $7.2 million
Fact 5
! A 2012 report from the U.S. Department of Health's Office of Civil Rights found that in three years, 21 million patients became the victims of medical record data breaches.
Companies need to create a well-defined, transparent BYOD policy that employees sign off on. The policy should set expectations as to which responsibilities would fall under the employee and which under the employer.! When writing your policy, here are some questions to get you started:! Should we limit access to some data?! How will we support different devices?! When do we have the right to access employee-owned devices?! Can our network handle the added traffic?! Should we whitelist and blacklist apps to protect devices and data? Should we create an internal app store instead?! Will specific apps be pushed to employee-owned devices?
Can we remotely wipe any device in case it s lost or stolen, or if an employee is terminated?! Who pays for what? How do we determine monthly stipends?! Embracing BYOD in your workplace does not have to be wrought in terror and night-sweats. If properly planned for, the advantages to your business may far outweigh the risk.! A good first step is assessing your wireless network to ensure it is stable and robust enough to accommodate BYOD.
Increase Security BYOD SOLUTION Decrease Security
Essentially in the modern era. We at Wraith Intelligence define threats to your BYOD policy originating from two distinct parties"! Government Threats"! Non Government Threats
Remember! By 2016, 20% of enterprise BYOD programs will fail due to deployment of mobile device management measures that are too restrictive.