BYOD Trend Grows as Security Issues Escalate

Sunday, October 07, 2012

Bill Gerneglia

44fa7dab2a22dc03b6a1de4a35b7834a

Security Issues to Escalate as 350m Employees to Use Personal Mobile Devices at work by 2014 as the ‘Bring Your Own Device’, BYOD, trend raises security loopholes.

A new report from Juniper Research has found that the number of employee owned smartphones and tablets used in the enterprise will more than double by 2014, reaching 350 million by 2017, compared to almost 150 million this year. This represents almost 23% of the total installed base of consumer owned tablets and smartphones.

BYOD Trend Grows

The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets.

The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor. 

Security Risks

The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report found that whilst this trend can bring productivity benefits to businesses, it also poses potential security risks.

In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.   

Report author Nitin Bhas observed “While BYOD has become an ‘inevitable’ trend for the enterprise, businesses need to create new end-user IT policies and address the key security issues emerging. New device management policies and security measures need to be put in place”.

Other key findings include:

1. The public sector will be late adopters of the BYOD in the market.

2. Western Europe will account for the highest number of consumer owned devices within the enterprise.

Cross-posted from MyITView

Possibly Related Articles:
10678
Enterprise Security
Information Security
Enterprise Security Data Loss Prevention Policies and Procedures BYOD
Post Rating I Like this!
F66c1a87a8db2cb584b4e06e93a84ce3
Mikko Jakonen Good introduction Bill, thanks.

It good that analytics create pressure for industry. Then what comes to the BYOD and the concept within, well, there is NONE actually. There is no concept or architectural principles where manuefacturers and vendors could instantiate their solutions.

We are living basically same history again while we started to understand the risks coming for desktop environment.

Current BYOD strategies are doomed to collapse as the technologies available are merely security applications on
top of unprotected, unsecure operating environment and services, and shall leave 80% of the stack wide open for speculation.

So the risks; BYOD is extremely FINE - but the whole solution stack requires heavy evolution.

It is not enough that COMPANY data, such as e-mail is protected with EXTRA APPLICATION; The environment where the data is handled must be secure. Whole thing starts in the beginning from understanding how data is managed within organization and ending up to mobile phones, which in turn require exactly same operaing principles
than desktop/laptop security does.

I am touching this phenomenon in my upcoming article "BYOD: a thing going wrong by nature".

With this article to be released, I am going to deliver my insane arguments against the current theorem in wild and introduce, potentially, a way (“model”) to dismantle discussion around BYOD.
1349774646
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.