Amazines Free Article Archive
www.amazines.com - Friday, April 26, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330641)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241953)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185521)
 Electronics (83524)
 Email (6438)
 Entertainment (159855)
 Environment (28973)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630137)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251211)
 Home Repair (46244)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191031)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80507)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126700)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110291)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49312)
 Software (83034)
 Spiritual (23517)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308305)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35843)
Author Spotlight
DESIGNPLUZ DIGITALAGENCY

Designpluz has steadily matured from a passionate graphics design start-up, into a full service digi...more
ELLIOT CHANG

Financial analyst and author writing on economy and business. ...more
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more


BYOD information security management: Too much focus on tech? by Article 10 Integrated Marketing





Article Author Biography
BYOD information security management: Too much focus on tech? by
Article Posted: 06/14/2013
Article Views: 137
Articles Written: 7
Word Count: 934
Article Votes: 0
AddThis Social Bookmark Button

BYOD information security management: Too much focus on tech?


 
Business,Insurance,Marketing
BYOD is on the rise, bringing a new level of risk to information security management. In response, developers are racing to launch new technologies to manage and secure employee-provided devices. But are we focusing too much on the tech? Keith Ducatel outlines the behavioural considerations that play an equally vital role.

Although BYOD has largely focused on employee-provided smartphones and tablets so far, many predict that laptops and even the odd desktop will soon follow. A vision has been proposed of total flexibility, in which the employee gets to work on the equipment they most enjoy working on – greatly boosting the productivity of the organisation. In fact, I see some commentators have gone so far as to cite the rise of BYOD will threaten the traditional role of the CIO. I wonder whether this is the real reason why 180 IT directors just told Insight UK’s mobility survey that they weren’t currently implementing a BYOD strategy? They said things like ‘hidden costs’ were preventing them, but perhaps long-term job security is the secret driver here!

As this perhaps demonstrates, we need to be careful about the hype. BYOD is a huge area of debate. Does BYOD add value? Insight UK’s study says it does, with 82% of companies that have introduced a BYOD policy noting visible improvements to staff morale. Is BYOD the essential next step for all organisations? Whilst many commentators say yes, perhaps the more realistic answer would be: depends on the nature of the organisation and its employees. Is BYOD worth the additional risk to an organisation’s information security management? This is the question that CISOs and CIOs are currently battling with.

BYOD increases information security management risk, and the recent Executive Council and Galvin Consulting survey of 100 CISOs reveals a range of concerns. My specialism is the behavioural aspects of information security, so I’ll restrict this article to just the key areas of BYOD risk in that sphere – outlining a few key messages for each. But first, I present two underlying concepts that provide strong psychological context to those messages.

Underlying concepts

One concept to convey is that your IT network is a carefully configured system that serves to protect the integrity of your information as much as it serves to help employees carry out their roles. They must understand that plugging in a device that isn’t carefully aligned with that IT network is like knocking a hole through your kitchen wall before you head off to work. The front door and windows may be bolted, but anyone can get in. That’s just a quick crude metaphor for the purpose of this article, and there are many compelling visual ways to help contextualise the dangers.

Another relevant underlying concept is privilege. For many organisations, BYOD isn’t strictly necessary. But even organisations that see it as an enabler can still communicate their BYOD policy as a perk rather than a procedure. A culture of privilege inherently communicates that behaviour must be exemplary in order to attain and retain the reward.

Three key threats

Care of the device: Having yet another device with company data on it going back and forth between home and work increases the threat of theft and loss. Most employees transport a phone with company email on it. Many employees also transport a laptop. If you haven’t already communicated a device transportation policy, then now is the time to make one clear. The standard common sense measures such as not leaving devices unattended in public or in a vehicle all apply. However, equally relevant to this issue is what you communicate about...

Data storage: What data are employees allowed to store on the device? Many information security management policies restrict smartphone and tablet usage to email and Internet browsing only, with a ban on all confidential information being held on them. If your BYOD policy extends to laptops, then what will employees be allowed and not allowed to store on them? Is it practical to force employees to only work on confidential information from a server when in the office? Is taking confidential information home with them acceptable if it’s transported in an encrypted format? Whatever you decide on, this must be communicated clearly.

Allowed activities: This is perhaps one of the biggest risks to information security management. The problem is, the device is the employee’s own, so there’s a natural compulsion to do whatever they want on it. For example, downloading apps onto a smartphone or tablet, installing freeware to perform tasks such as accounting, plus any shall we say ‘erroneous surfing proclivities’. All of these activities greatly increase the risk of downloading viruses and malware. Employees must understand that as soon as their device comes into contact with corporate data or a corporate network, all of the organisation’s acceptable use requirements come into effect. The device can no longer be used as one might use a purely personal device. This is where the two underlying concepts outlined earlier can potentially have the strongest reinforcing effect.

Behavioural education

Let’s not forget that it’s the way that employees use their devices that presents the risk. That makes it a behavioural issue. So to focus too much on the technical aspects of security is only solving half of the information security management problem. A blatantly careless action executed out of lack of knowledge renders all software security useless. With that in mind, I’m delighted to read GCHQ’s recently released “10 Steps to Cyber Security”, which could be interpreted as placing user education and awareness on the top tier of an organisation’s information security management programme.

Related Articles - focus, tech,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license