Home > Security & Compliance > BYOD Security – Dealing with Backlash, Battles, and Victories
BYOD Security – Dealing with Backlash, Battles, and Victories

BYOD Security – Dealing with Backlash, Battles, and Victories

Isn’t it great that contractors and employees (i.e., business users) have the flexibility to work remotely and on the go, with access to business networks via their own personal devices, including laptops, tablets and smartphones? Great for them, anyway.

On the flip side, CIOs are saddled with even more worry and responsibility in light of the bring-your-own-device (BYOD) movement: greater security threats.

ZDNet’s Michael Krigsman says that how CIOs chose to handle BYOD challenges is a moment of truth. Those who adopt new technologies with ease and enthusiasm and adjust IT policies accordingly can come off looking like heroes. Those who take a different approach can wind up a target of scrutiny within the organization.

It’s no secret that not everyone within the organization is on the same page as their IT department. In fact, a recent Accenture report found misaligned priorities particularly between CIOs and chief marketing officers (CMOs) when it comes to BYOD. States Krigsman, “When your tools at home are better than those at work, it causes frustration. Mobility and collaboration are a lifestyle and you cannot expect employees to be chained to their desk.”

Bottom line: the best BYOD plans are ones that agile and secure. Some of the ways organizations can feel more in control over BYOD are:

  • Update mobile policies. For those business users on the BYOD bandwagon, consider the advantages of remote wiping, separating business and personal data, and requiring pass codes.
  • See things black and white. Establish which apps and tools should be white-listed and black-listed.
  • Inventory devices. Get a real handle on which devices/gadgets are actually in use.

As Krigsman of ZDNet cautions, BYOD is indeed challenging CIOs to think beyond in-the-box security. Tools such as mobile device management (MDM) may be extremely beneficial to them as they navigate security, rules and controls of BYOD.

By leveraging a single MDM platform, IT teams can support a diverse fleet of devices — and easily and securely implement a flexible BYOD strategy.

At the center of MDM support and BYOD strategy and up for Best BYOD Solution of 2013 – having recently acquired industry experts CenterBeam – is EarthLink Business.

Learn more about how the application of MDM is helping CIOs win the war BYOD security.

About EarthLink Blogger

EarthLink Blogger
For more than 20 years, EarthLink has revolved around how to efficiently connect our customers with technology. Today, we are committed to making our customers’ customers happy with the technology foundation that underpins an exceptional experience. We have numerous industry and technology experts on staff at EarthLink, and each not only has extensive knowledge and experience in their field of expertise, but also a passion for ensuring EarthLink remains true to that commitment. They also enjoy sharing insights into the latest technology innovations in the hopes of informing and helping to reduce the burden on IT professionals.