Page 35 - CDM-Cyber-Warnings-March-2014
P. 35
Access Permissions: A crucial element of implementing a BYOD policy is establishing how users can access your network from their personal devices. Many companies integrate their LDAP or Active Directories into this process to ensure that only authorized employees are accessing data. For instance, just because a marketing employee can access the network from a mobile phone, doesn’t mean they should be able to open HR documentation – all established information access protocols need to be left in place, no matter the device. And speaking of opening documentation, companies need to make sure that once an employee does open a file on their mobile phone the information remains secure, instead of being stored locally, which can cause data duplication and potential breaches. Any solution chosen to support a BYOD policy should have a strict list of apps that can ‘open-in’ information, to ensure total information security. Authentication Methods: Approving any number of new devices to access a network requires updated authentication methods. Whether this is done through a protocol like Kerberos or through password-authenticated key agreements is up to each individual enterprise. Businesses that are especially serious about their security are creating triple- layer architectures so that the web, app and data layers all have their own authentication tokens, dramatically decreasing the risk of data loss, no matter how many devices are accessing the network. BYOD security concerns aren’t going to disappear, in fact they’ll only continue to grow – two- thirds of the mobile workforce will own a smartphone in 2016, and 40 percent of the workforce will be mobile, according to Gartner. Companies need to decide how they’ll protect their companies as they implement BYOD policies – for both devices and data – and move to do so immediately. Hormazd Romer is the senior director of product marketing at Accellion. At Accellion, Romer drives product positioning, product messaging and thought leadership. He brings over 12 years’ experience driving product marketing management for enterprise software solutions spanning enterprise security including Web security, identity management, cloud and virtualization security. Prior to Accellion, Romer was the director of product marketing at Symantec. He graduated from the University of Waterloo. " # % " $ " # ! !