6 ISSUES FOR JUST £6 Subscribe to Business & Professional Life today CLICK HERE

Ensure smartphones don’t pose the biggest threat to business security

PUBLISHED: 14:56 02 August 2017

Lorrin White, Bamboo

Lorrin White, Bamboo

Archant

With the cyber security attacks against businesses on the rise – particularly with the current epidemic in ransomware hitting businesses of all sizes, is it time for IT to take back control?

To secure or manage anything, you need to have some control over it. Simple, yes?

For years, IT had complete control over its domain. If you wanted a new piece of software or a new phone, you had to ask IT for it. And there was good reason for this. If something went wrong, IT had a better chance of fixing it quickly because it knew the environment so well. It also knew which software was installed and on which hardware because it either chose or authorised it in the first place.

But the model of IT having exclusive control over its environment has been slowly eroded in recent years. The so-called ‘consumerisation of IT’ (where major technology innovations are largely fielded to consumers first before making their way into businesses) has turned IT on its head. Employees are now buying the best and most innovative technology for their personal needs and can download any piece of software they want within seconds, so they are baffled when their place of work expects them to jump through hoops just to update Office 365.

The reaction to this shift in employee expectation has been the trend of Bring Your Own Device (or BYOD). In businesses with a BYOD policy, employees are not just allowed to use their own devices at work, they are actively encouraged to do so. Employees generally love BYOD because they can use the technology they want to use and don’t have to carry multiple devices for personal and work use. Businesses love it too, because employees are more productive and they often don’t have to spend so much on new hardware. But this change in ownership has eroded the control, and with it the protection, that IT once provided. With the cyber security attacks against businesses on the rise – particularly with the current epidemic in ransomware (WannaCry, Petya etc.) hitting businesses of all sizes, is it time for IT to take back control?

Unintended consequences

The most popular device that employees want to use at work is their smartphone. The challenge here comes from their unique combination of ultra-portability, high computing power and 24/7 connectivity. At the very least, a smartphone will have access to the company’s email system, but it could also have access to the company’s VPN and run a number of proprietary apps with direct access into the company’s ERP system.

By their very nature of being mobile, smartphones probably pose the biggest risks to information security in an organisation. Imagine someone picking up their workstation and walking out the door with it every time they leave the office. This is effectively what employees are doing every day with their smartphones. However, as a result of BYOD, a large proportion of these devices aren’t even provided by the organisation and therefore are often not managed by the organisation’s IT department either. So instead of walking out the door with their office PC, it’s the equivalent of bringing in their home laptop – complete with all the unapproved apps (potentially riddled with spyware, ransomware and other viruses) that their teenage children downloaded the night before – loading it up with corporate data and walking out the door with it.

A third way: Enterprise Mobility Management

It is clear that when it comes to BYOD, organisations need to balance user freedom with the control necessary for security. In fact, it is essential. A totally unmanaged device with full corporate access is a significant security risk every single time it enters or leaves the place of work, but most employees do not appreciate their employer taking their shiny new iPhone 7 – which they paid for themselves for their own personal use – and loading it up with onerous security applications and restrictive policies. It is seen as an invasion of their privacy and overstepping the line between work and personal life. The result? They simply ‘go rogue’ and don’t tell IT about their new device, undermining the organisation’s security policies in an instant.

Businesses cannot turn the clock back on BYOD, so they need to find a way to manage devices that maximises security while minimising interference. The method that many businesses are turning to is Enterprise Mobility Management (EMM), which provides a single dashboard for monitoring, managing and securing an employee’s mobile device. EMM allows businesses to set access controls for applications, data, apps, email and pretty much anything else within any device it is installed on, and much to the user’s delight, EMM does not bloat their phone with visible corporate controls. In fact, EMM can partition the device to separate work and personal applications and data. This prevents the employer from gaining access to personal information on the phone and if the phone is lost and needs to be remotely wiped, only the work data is affected.

EMM is fast emerging as the next essential cyber security tool for businesses. I believe it will soon be considered as much a necessity as antivirus software, firewalls and VPN. It is essential for BYOD environments because it addresses all three areas of mobile security – the devices, the applications that run on them and the information stored on them.

The reality is you cannot undo technological innovation. You can only embrace and work with it. EMM is the third way for businesses, allowing them to maintain the BYOD policy that has proved so popular with employees while giving back enough control to IT to keep the business safe.

Who knew being in control could be so freeing?

Want to find out more? Visit the Bamboo Technology Group website!

0 comments

Welcome , please leave your message below.

Optional - JPG files only
Optional - MP3 files only
Optional - 3GP, AVI, MOV, MPG or WMV files
Comments

Please log in to leave a comment and share your views with other Cotswold Life visitors.

We enable people to post comments with the aim of encouraging open debate.

Only people who register and sign up to our terms and conditions can post comments. These terms and conditions explain our house rules and legal guidelines.

Comments are not edited by Cotswold Life staff prior to publication but may be automatically filtered.

If you have a complaint about a comment please contact us by clicking on the Report This Comment button next to the comment.

Not a member yet?

Register to create your own unique Cotswold Life account for free.

Signing up is free, quick and easy and offers you the chance to add comments, personalise the site with local information picked just for you, and more.

Sign up now

More from Cotswold Life

Yesterday, 17:16

Stepping up to receive the world’s first MBA Leading Business degrees at the ceremony were Sarah Bryars, Chief Executive of Target; Luke Freeman, Joint Chief Executive of MF Freeman; and Linsey Temple, Chief Executive of Gloucestershire Engineering Training

Read more
Yesterday, 17:04

“I am thrilled to see InfoSec People win this fantastic award which is a testament to the brilliant team we have built in the past few years.”

Read more
Yesterday, 16:36

After a stress-free shopping experience browsing designer brands this Christmas? Look no further than the luxury offerings of The Mailbox in Birmingham

Read more
Yesterday, 10:24

This year sees the 40th anniversary of the publication of Raymond Briggs’ original picture book The Snowman. With three performances of the animated film – with live orchestra – coming to Gloucester Cathedral next month, we thought we’d catch up with Rachel Whibley, managing director of Carrot Productions (and occasional snowman), to find out more...

Read more
Mon, 14:10

It’s the season of terrible puns, magic lamps, and generous genies: Aladdin, the all-new panto at the Everyman, has been written by none other than legendary Blue Peter presenter Peter Duncan, and stars everyone’s favourite clown, Tweedy. The Barnard family from Nailsworth - mum, dad, Harriet (12) and Lewis (6) - made a Wishee (Washee) for tickets; grabbed their car (Window Twan) keys; and dashed off to see A Ladd In Cheltenham

Read more
Mon, 13:45

Crispy, frosty days and perhaps even a dusting of snow, winter is a magical time in the Cotswolds. If you’re thinking of tying the knot during this beautiful season in the region, here are six winter wedding ideas to help you start planning your special day

Read more

Christmas in the Wilson household is a heartwarming, traditional family affair

Read more
Mon, 13:15

Tracy Spiers takes an impressive, if hypothetical, budget on a shopping spree in Cheltenham’s independent stores

Read more
Mon, 13:09

Veganism is the latest food trend to hit the Cotswolds but it’s something we can all enjoy a bite of

Read more
Mon, 12:23

Get out and enjoy seasonal celebrations with a Cotswold twist

Read more
Mon, 12:21

The weekend is fast approaching and for those still deciding how to spend their Friday through to Sunday, we pick 5 of the best ways to spend your weekend in the Cotswolds

Read more
Mon, 09:13

Alleviate the stress of hectic Christmas preparation and endless shopping trips with a festive afternoon tea in one of these gorgeous Cotswold settings

Read more
Friday, December 7, 2018

Find a fabulous gift for everyone with Whatley Manor’s monetary vouchers.

Read more
Thursday, December 6, 2018

One lucky reader could win a pair of tickets to see Ella Mills, founder of Deliciously Ella, at Calcot Manor as well as two signed copies of ‘The Plant-Based Cookbook’

Read more

Newsletter Sign Up

Sign up to the following newsletters:

Sign up to receive our regular email newsletter

Our Privacy Policy

Topics of Interest

Food and Drink Directory A+ Education

Subscribe or buy a mag today

subscription ad

Local Business Directory

Property Search