Managing the BYOD risk

Fran Howarth

Written By:
Published: 19th August, 2014
Content Copyright © 2014 Bloor. All Rights Reserved.

BYOD is a seemingly unstoppable force. Almost every organisation is grappling with it—whether they know it or not. Rogue devices, that are often outside of the control of the IT department, can be present on any network if the organisation is not continuously monitoring its network to discover all devices that are connecting to it. And it does not stop there—employees are increasingly turning to the use of unsanctioned applications, such as cloud-based file sharing services, because they feel they make them more productive, able to access the information they place in them from wherever they are, whenever they want, on any device they choose. Increasingly, they are using such services for gaining access to sensitive corporate information.

Network users that use personal devices and applications of their choice can inadvertently introduce security risks into the organisation, including viruses, malicious attacks and accidental data loss.

Bloor Research took part in a roundtable sponsored by ForeScout Technologies and facilitated by the Guardian and Infosecurity Magazine to discuss the issues surrounding the so-called consumerisation of IT. This article, originally published in the Guardian, is a write-up of the discussion:

Post a comment?

We welcome constructive criticism on all of our published content. Your name will be published against this comment after it has been moderated. We reserve the right to contact you by email if needed.

If you don't want to see the security question, please register and login.