Security concerns persist around employee devices


Security concerns persist around employee devices

Simon Quicke

The prospect of employees bringing their own devices to work is still causing unease for those responsible for securing corporate networks.

The Bring Your Own Computer (BYOC) movement has been gathering momentum with staff being given budgets by their employers and allowed to buy their own technology.

But IT managers might still need some convincing and support from resellers to calm their fears of the security implications of allowing numerous devices to connect to the network.

Research from the global IT association ISACA indicated that 61% of UK technology bosses believed that employee-owned mobile devices posed a greater risk than products handed out by the employer.

The greatest fear was around the concept of company data being stored on employee-owned devices with a third of firms admitting that even though they have a mobile security policy it needs to be updated.

"The opportunities and rewards in IT are there, but new risks and cyber threats are rapidly becoming part of our day-to-day reality. Protection and risk management are more important than ever, and they should be seen as strategic priorities." said Rolf von Roessing, international vice president of ISACA.

The upshot of the findings for resellers will a clear indication that they need to help users get to grips with both securing remote access and establishing clear policies.

"Mobile devices usually are not under the full physical control of the enterprise. However, they still should be managed, controlled and secured by enterprise-wide policies, standards and procedures," said Ramsés Gallego, chief evangelist officer at Entel IT Consulting.

The latest risk survey from ISACA indicated that there are also continued worries about the cloud and security and as a result the move by some UK firms towards embracing the technology has been sluggish.

Join the conversation Comment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.