The bring-your-own-device (BYOD) trend is sweeping through many businesses, as employees bring their personal tablets and smartphones into the workplace. Although BYOD is beneficial for enterprise mobility in that companies no longer have to issue their own products to staff members, it comes with continued security fears. If a worker-owned device is lost or stolen, corporate data may be unintentionally exposed as a result.
A recent Forbes report by contributor David Amerland suggested that mobile cloud computing (MCC) may hold the key to keeping firms safe from potential BYOD blunders. The writer explained that MCC, just like traditional cloud services, requires storage and data processing to be handled outside of mobile devices. Employees can still bring their own devices to work and firms can save on hardware expenditures, but all storage takes place in a corporate cloud, making it more secure as a result.
The use of MCC, however, is not without some challenges. Some employees may not support the idea of having their activity tracked by employers. According to Amerland, businesses must ensure they have proper governance in place if they want to have a successful BYOD deployment.
BYOD causing cybersecurity headaches
Companies want to keep the workforce content and save money at the same time. Although BYOD can help both workers and employers, the trend is still considered a danger to secure file sharing. A survey conducted by F5 Networks at the RSA security conference found that more than 70 percent of organizations said virtualization has made it more difficult to safeguard their IT infrastructures, while 55 percent said the same of BYOD.
A recent survey of organizations at the RSA conference by F5 Networks found that companies are struggling to protect their IT infrastructure due to several technologies that are making it a more complex matter to deter hackers.
Mark Vondemkamp, vice president of product management at F5, said businesses are struggling to keep pace with the ever-changing security landscape.
"Companies will do well to proactively address trends like BYOD and cloud security, but they should also look to raise their game in terms of threat detection and mitigation," Vondemkamp suggested. "With employee behavior, business priorities, and infrastructure demands further expanding traditional threat vectors, the proper tools and procedures are essential in maintaining a healthy level of security."
The BYOD phenomenon shows little signs of slowing, making it even more important for businesses to have the right solutions in place to protect themselves from potential breaches.