Traditional IT security ‘won’t match BYOD needs’

214 Views

Trying to stretch traditional IT security to fit BYOD may not be ideal for companies, one expert has warned.

Businesses eager to get involved with the ‘bring your own device’ (BYOD) trend may need to draw up new security policies that meet the challenges of having so many pieces of technology connected up to their infrastructure.

This is according to IBM Institute for Advanced Security director Glen Gooding, who told ZDNet he is already seeing companies taking the wrong route when it comes to this phenomenon.

"We’re in a state of flux, where businesses are migrating existing security policies that have been embedded within organisations for a number of years now. Many organisations are changing those existing policies and trying to retrofit them to mobile devices," he commented.

The expert warned that this may not work, as the challenges facing mobile devices are very different to those that can affect on-site computers.

"I believe the policies that are going to be more successful in defining mobile security are the ones that start from scratch and actually build a policy in and around a mobile-only concept," Mr Gooding opined.

This will also help to educate users to make better decisions about device application as the workplace starts to become even more dominated by BYOD, he pointed out. 

Writing for IT World, Josh Bernoff and Ted Schadler from Forrester Research also said mobile working is going to require a shift in mindset.

"Build a centre of excellence to guide the technology, strategy and execution of all mobile projects, whether focused on customers or employees … Begin the massive but essential task of redesigning your systems for rapid mobile access," they recommended.

To make BYOD much easier, give Dajon Data Management a call. We can implement document storage solutions that allow paperwork to be accessed quickly by staff on their smartphones and tablets, without compromising security.

This latter part is crucial, as the safety of confidential paperwork may be compromised as soon as it leaves the workplace unless measures are in place to prevent this.

Leave a Reply

Your email address will not be published. Required fields are marked *