BYOD ‘Requires New Security Plans’

5
BYOD ‘Requires New Security Plans’ Facebook.com/storetec Storetec Services Limited @StoretecHull www.storetec.ne t It is not likely to be enough for businesses planning to participate in the 'bring your own device' (BYOD) phenomenon to simply stretch their previous IT security policies to fit, according to one expert on the subject. Glen Gooding, IBM Institute for Advanced Security director, said in an interview with ZDNet that he is seeing this happening, even though it is not enough to cover the challenge of such a large number of mobile devices linked to company infrastructure.

Transcript of BYOD ‘Requires New Security Plans’

Page 1: BYOD ‘Requires New Security Plans’

BYOD ‘Requires New Security Plans’

Facebook.com/storetec

Storetec Services Limited

@StoretecHull www.storetec.net

It is not likely to be enough for businesses planning to participate in the 'bring your own device' (BYOD) phenomenon to simply stretch their previous IT security policies to fit, according to one expert on the subject.

Glen Gooding, IBM Institute for Advanced Security director, said in an interview with ZDNet that he is seeing this happening, even though it is not enough to cover the challenge of such a large number of mobile devices linked to company infrastructure.

Page 2: BYOD ‘Requires New Security Plans’

He commented: "We're in a state of flux, where businesses are migrating existing security policies that have been embedded within organisations for a number of years now. Many organisations are changing those existing policies and trying to retrofit them to mobile devices."

Since the issues surrounding smartphones and tablets are not the same as those for older, office-based PCs, this could easily lead to big problems.

Page 3: BYOD ‘Requires New Security Plans’

"I believe the policies that are going to be more successful in defining mobile security are the ones that start from scratch and actually build a policy in and around a mobile-only concept," Mr Gooding said.

He pointed out that as workplaces become ever-more influenced by BYOD, sturdy security measures are likely to highlight the importance of making sensible decisions about device application to users.

Josh Bernoff and Ted Schadler from Forrester Research had similar opinions in an article for IT World magazine, saying there is going to have to be a big shift in mindset if the use of mobile is going to increase.

Page 4: BYOD ‘Requires New Security Plans’

They recommended that business owners should: "Build a centre of excellence to guide the technology, strategy and execution of all mobile projects, whether focused on customers or employees … Begin the massive but essential task of redesigning your systems for rapid mobile access."

Management of applications in the cloud need not be a headache if you make the most of the services available from Storetec – we can offer secure online hosting that means you have the benefits of security, no matter what devices your employees are using.

Page 5: BYOD ‘Requires New Security Plans’

Storetec News/Blogs."http://www.storetec.net/news-blog/byod-requires-new-security-plans/". BYOD ‘Requires New Security

Plans’. Aug 2, 2012. Storetec.