{"id":99,"date":"2014-06-01T12:06:01","date_gmt":"2014-06-01T16:06:01","guid":{"rendered":"http:\/\/kevinjgoodman.com\/?p=99"},"modified":"2014-06-01T12:06:01","modified_gmt":"2014-06-01T16:06:01","slug":"byodevice-dilemma","status":"publish","type":"post","link":"https:\/\/kevinjgoodman.com\/index.php\/2014\/06\/01\/byodevice-dilemma\/","title":{"rendered":"The BYOD(evice) Dilemma"},"content":{"rendered":"<h2>Before you address the technological aspects of bringing your own device and the security issues that come with it, address the common aspects: Mobile devices are just that \u2013 mobile. You can take them most anywhere. If employees are going to access sensitive company data on their devices, you have to make it clear that you are trusting them to look after their devices. It\u2019s not just a physical theft issue; data theft can take place, particularly when one signs into a public Wi-Fi network.<\/h2>\n<p>Use common sense regarding when and where you carry your device. Have awareness of where you are and if you\u2019re accessing a network in a public place. Security is a two-way street. You want your company\u2019s data to stay secure no matter where your employees take their devices, but you also want to be aware of new devices that may be assessing your company\u2019s network. A virus-riddled tablet computer can bring an entire network to its knees.<\/p>\n<p><a href=\"http:\/\/74.214.25.114\/wp-content\/uploads\/2014\/06\/BBN-CLE-5-O-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-496\" src=\"http:\/\/74.214.25.114\/wp-content\/uploads\/2014\/06\/BBN-CLE-5-O-1-300x168.jpg\" alt=\"BBN CLE 5 O 1\" width=\"300\" height=\"168\" \/><\/a><\/p>\n<p>One solution is to have a guest network apart from your company network. If a device hasn\u2019t passed muster with your company\u2019s IT department, a guest network can keep it segregated, effectively quarantining any malicious software.<\/p>\n<p>It\u2019s always a good idea to consider multiple layers of networking. You can work with your IT people to design and construct a guest network but still allow it to talk to the main network. It\u2019s also a good idea to clearly understand data breach laws and limit the types of data we collect.<\/p>\n<p>Even if you don\u2019t believe someone is out to steal your data, it\u2019s important to protect yourself against hackers and information theft. That fact shouldn\u2019t discourage you from allowing a BYOD policy, but it should prompt you to start a high-level dialogue within your company regarding how you\u2019ll address the issues that accompany it.<\/p>\n<p><a href=\"http:\/\/www.bluebridgenetworks.com\/infrastructure-solutions\/network-security\">Our company has launched a new Mobile Device Management service called BlueCloud MDM within our data center security practice that provides industry-best features, superb default security policies, and is integrated with our services.<\/a><\/p>\n<p>Cloud MDM provides a complete solution for managing mobile devices, applications and content, with support for every mobile platform. Unlike hosted email vendors whose only \u201cmobile security\u201d answer is ActiveSync, and unlike other MDM vendors who simply sell tools and leave the messy policy work to customers, BlueCloud MDM offers a solution that provides everything customers need to be successful, one that combines technology, policy and law.<\/p>\n<p>We live in a data centric world where as soon as we gather information, we\u2019re disseminating it. BYOD is a part of that. It offers tremendous advantages as far as timeliness and efficiency but the flip side is security and corporate responsibility. There are 1,001 ways to rob the bank. You have to come up with 1,002 ways to prevent it.<\/p>\n<p>Link to CBC Magazine: <a href=\"http:\/\/cbcmagazine.com\/2014\/06\/01\/byodevice-dilemma\/\">http:\/\/cbcmagazine.com\/2014\/06\/01\/byodevice-dilemma\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before you address the technological aspects of bringing your own device and the security issues that come with it, address the common aspects: Mobile devices are just that \u2013 mobile. You can take them most anywhere. If employees are going to access sensitive company data on their devices, you have to make it clear that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":496,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9],"tags":[31,33],"class_list":["post-99","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-operational-excellence","tag-security","tag-technology"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/kevinjgoodman.com\/wp-content\/uploads\/2014\/06\/BBN-CLE-5-O-1-scaled.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts\/99","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/comments?post=99"}],"version-history":[{"count":0,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts\/99\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/media\/496"}],"wp:attachment":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/media?parent=99"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/categories?post=99"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/tags?post=99"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}