March | 2013
The concept of Bring Your Own Device (BYOD) is now becoming a rule than exception in today's workplace. In a recent survey by Gartner, 70% respondents said they either already have or are planning to introduce BYOD policies in the next 12 months.
While there are several benefits associated with allowing users to bring in their own personal devices, there are some concerns as well. The topmost BYOD concern is security. Employees are not only bringing their own devices, but launching their own network services, a potentially severe threat. Other challenges include:
Despite these security issues, almost 80% of today's BYOD activity remains inadequately managed. In fact, a Gartner study reports that only a small 33% of organizations surveyed have policies in place to address BYOD-related issues.
The answer lies not in abandoning the BYOD initiative as some have, but in setting up proper security measures. For an effective BYOD implementation, enterprises must follow a five-step process that comprehensively covers information security and privacy issues.
While nothing can completely protect enterprise data from a determined, deliberate attack, the above steps will help enhancing employees' productivity on their preferred devices, without compromising on security. Do you agree? I would love to hear from you on your experience with this trend.
Yogesh Hinduja is an Associate Practice Partner with Wipro Consulting Services with over 13 years of extensive consulting experience in the domain of Information Security, Business Continuity Management, IT Risk Management, Project Management, Transition, Migration, Network, Client Relationship Management and operations management across various countries.
© 2021 Wipro Limited |
|
© 2021 Wipro Limited |
Pharmaceutical & Life Sciences