Share

Related Stories

  • Gen Y on BYOD: Don't tell me what to do
    More than one-third of Gen Y employees admitted they have or would contravene a corporate policy banning the use of personally owned devices for work purposes, according to a survey sponsored by Fortinet.
  • Comment: Securing BYOD is More Than a One-step Process
    BYOD is no longer a trend, it’s a reality says Frank Andrus of Bradford Networks. Here he explains why implementing BYOD securely requires a comprehensive blueprint, and cannot be done through a single technology solution
  • A new solution for authenticating BYOD
    New start-up SaaSID today launches a product at CloudForce London that seeks to solve a pressing and growing problem: the authentication of personal devices to the cloud.
  • BYOD threatens job security at HP
    BYOD isn’t simply a security issue – it’s a job issue. Sales of multi-function smartphones and tablets are reducing demand for traditional PCs; and this is hitting Hewlett Packard.
  • Let’s Get This BYOD Office Party Started
    The most dangerous security aspect of BYOD, according to many experts, is the apps that personal devices run, not the operating system or hardware. Fred Donovan examines how organizations can say ‘yes’ to employee-owned devices while still maintaining control of their data

Top 5 Stories

News

Security issues increase corporate BYOD costs

16 August 2012

Despite the perception that bring your own device (BYOD) saves organizations money, more than two-thirds of IT professionals believe it increases costs, primarily due to the added security risks and measures required, according to a survey by Lieberman Software.

Less than one-quarter of respondents judged that BYOD reduces costs, with 10% being unsure, according to the survey of 250 IT professionals at Infosecurity Europe 2012 carried out by Lieberman Software.

Almost half (43%) cited an employee device introducing a virus into the corporate network as their biggest BYOD concern; more than a quarter (26%) pointed the finger at employees losing a device, with employees stealing data the biggest concern for 22% of respondents, the survey found.

“Because these are consumer-grade devices, they lack a lot of the controls that would be there in a corporate device”, said Philip Lieberman, president and chief executive officer of Lieberman Software. In addition, IT needs to be able to wipe these devices if they are lost. “This opens up a whole can of worms for IT", he told Infosecurity.

“Another issue is that the number of devices they have to manage increases IT’s costs, as well as the software necessary to manage all these devices”, Lieberman observed.

“IT really hates these things. Unfortunately, they don’t get to set the direction on this issue. In many cases, the direction on BYOD is determined at a much higher level within the organization without an understanding of the cost issues and liabilities”, he lamented.

Lieberman argues that BYOD is being driven by device vendors, such as Apple, pushing their products as corporate ready or compatible – even if they are not.

“We’ve been here before. It’s the same classic back door sales process used to promote PCs in the 1980s, where the large IT shops controlled both the glass house and what was on the desktops. Back then users and managers would show how PCs were better, faster and more flexible than the ‘stone age’ solutions offered by IT. Ultimately, IT was forced to adopt PCs as their corporate standard. The new twist today is that the interlopers are devices that will always be owned by the consumer, not the company”, Lieberman said in comments about the survey results.
 

This article is featured in:
Compliance and Policy  •  Internet and Network Security  •  Malware and Hardware Security  •  Wireless and Mobile Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×