2593695373-b9a39891f7

Brandon Faber (South Africa) - Does BYOD Bring YMCA into Data Security?

You’d be forgiven for thinking that the bring-your -own-device (BYOD) movement is rivaled only by the spirit of 60s-style free love, the “Arab Spring” uprisings and the sheer hedonism of a Cape Town summer –so feverishly the beating of its drum from supporters the world over.

For those not in the know, BYOD allows employees to use their personally-owned endpoint devices to hook up into the corporate network.

Obviously the idea of staff members using their personal devices for work-purposes is an attractive one to company executives and (some) users alike, with CFOs no doubt salivating at the prospect of not having to invest in hardware  – and users pointing to freedom from draconian security laws which govern their use of company property.

Okay . . . Before we all break into song and run naked through the city streets, however, I have just two questions to ask.

1.    Does BYOD have a realistic place in a world of ever-increasing penalties for lapses in Governance, Risk and Compliance practices?

2.    Will BYOD really help organizations save money?

Deep Impact

The scale of the BYOD security problem was highlighted in this recent article on CIO.com, where results from a survey by Avanade revealed that, of 600 survey respondents, over 300 reported experiencing a security data breach as a result of consumer gadgets.

That’s more than 50%, and 18 million times more than the likelihood of you meeting an untimely demise in an airplane accident.

The problem, of course, is that BYOD puts control into the hands of employees who could care less about data security – until the proverbial **** hits the fan, followed by lots of begging at ITs feet to somehow make the pain go away. 

Another survey found that 78% of lawyers were either not concerned at all, or only somewhat concerned, at the prospect that confidential data could be at risk should their endpoint devices be lost, stolen or compromised.

Hello?

Show me the money!

The 5 hidden costs of mobile BYOD are discussed at length in this article but a few obvious questions you must be asking yourself have to include:


•    Who is going to support users when devices fail, at what cost and how long will it take to get users back up and running?
•    Secondly, what costs are involved with making sure apps and other software the company wants to utilize work on all the users’ varied devices?
•    What costs will have to be incurred to ensure that data security on a variety of privately-owned devices measure up in terms of Governance, Risk and Compliance?

When taking hidden and associated costs related to BYOD into consideration, research conducted by Aberdeen estimate that a typical BYOD environment could cost up to 33% more than a well-managed wireless deployment where the company owns the devices.

Eish.

Does this mean there is no case for BYOD, then?

Well, no . . . there is a place and I want you to help me find out exactly how, and where, that is.

Cibecs/ IDG Connect 2012 Enterprise Data Loss Survey

The rise of BYOD and the enterprise adoption of this trend form part of the question set in this year’s edition of our annual Data Loss Survey. Take part here.


Last year’s survey results can be downloaded here.

PREVIOUS ARTICLE

« Tanya Kalyan (South Africa) - Realizing the Potential of Generation Y

NEXT ARTICLE

Gene Zaino (US) - Challenges and Opportunities for the Independent Worker (Part 2) »

Recommended for You

How to (really) evaluate a developer's skillset

Adrian Bridgwater’s deconstruction & analysis of enterprise software

Unicorns are running free in the UK but Brexit poses a tough challenge

Trevor Clawson on the outlook for UK Tech startups

Cloudistics aims to trump Nutanix with 'superconvergence' play

Martin Veitch's inside track on today’s tech trends

Poll

Is your organization fully GDPR compliant?