Anyone following information security over the past 3 years has heard
the nasty four letter acronym of BYOD or Bring Your Own Device. This
phenomenon has taken shape as the consumerization of IT has made its way
to the enterprise. With tablets and smartphones exploding in popularity
over the past couple of years it’s no wonder that employees want to
start using the hardware (and the apps that run on them).
With a growing workforce of college grads that consider these devices an extension of their being, trying to take a smartphone from them would be like cutting off one of their hands. The two major concerns that security pro’s must deal with are:
- What can we do to protect our data?
- How do we protect our network against these personal devices?
Sensitive company data is walking around in your employee’s pants… unprotected. Is this data encrypted while it’s on your tablet or is it floating around in sites like dropbox.com waiting to be scooped up, stolen, or accidently released into the wrong hands?
Check out the rest of the article here: http://blog.algosec.com/2013/02/bring-your-own-devicedisaster.html