where to start with byod security

1

Upload: dell

Post on 22-Apr-2015

2.973 views

Category:

Business


0 download

DESCRIPTION

Where to start with Bring Your Own Device security? This ‘Day in the Life’ infographic shows how team member Derek works securely at work and on the go - even as security pitfalls await him: http://dell.to/1riBFCI

TRANSCRIPT

Page 1: Where to Start with BYOD Security

Device security is improving all the time with thumb-print and retina scanners becoming more popular, but data is safe in the cloud even without the latest technology.

BYOD is rapidly becoming a standard workplace policy, but many CIOs worry about data security because they don't use best practice techniques to protect data. BYOD suites are on the increaseto alleviate their fears.

Private clouds should only allow access to devices approved by the company or by limiting access points if using a BYOD system. A business with many locations can allow access to the private cloud via any of the IP addresses assigned to each location. Then when employees are logged in at work, they can access the private cloud.work, they can access the private cloud.

With all data stored in cloud applications, the loss of a device does not pose a security risk.

The data stored in the cloud has security protocolsdesigned for BYOD.

BYOD relies on users looking after their devices, but that doesn't mean their employer's data in the cloud is at risk.

IT security company Rapid7 reported that there will be 1.62 billion mobile devices in the workplace by 2016.

VoIP is used for many officetelephone systems - this isprovided by companies using cloudtechnology as a virtual telephone

Digital marketing, eCommerce and customer management are all manageable in one cloud software package.

Accounts departments use cloud-based software to manage all transactions including reporting to HMRC.

Cloud-based Document management systems contain all of a business' digital paperwork and manage revisions,permissions and even workflow.

Hardly any new business software hits the market that businesses are unable to deploy and secure via the cloud. This justifies most businesses moving to a system where BYOD is an option.

Live data such as stockcontrol software, web analytics and big data applications are all examples of essential software in the cloud used by most modern businesses.

Most software developers designapplications to work in browsers rather than on desktops because this improves performance in the workplace whereaccessibility is important.

CRM devices hosted on a private cloud that allow access via the internet are really a hybrid cloud setup. Security is maintained by limiting privileges for users working on thin client software over anuntrusted connection.

Using a private cloud allows the secure transfer of data because the connection is direct from device to server over a private network.

Connecting to a private cloud at work can limit people to using their devices for work purposes only because systems administrators can monitor traffic.

Derek understands how to minimise risk with BYOD and connects his work laptop to the internet by tethering his phone. The train has free WiFi, but free WiFi can be a security risk.

Derek checks project statuses via a thin client connected to his workplace CRM, which is accessible through the cloud.

The Mckinsey & Company report - 'The Social Economy: Unlocking value and productivity through social technologies' states that a potential productivityimprovement of 20-25% is possible when improvement of 20-25% is possible when using collaborative technology. This is enhanced when cloud technology allows greater access to collaboration tools.

Headphones play music streamed from cloud service such as iTunes or SoundCloud, using the train's free WiFi when it's no longertethered for work purposes.

Office365, Google Docs and many other office applications run in the cloud today.

Gmail, Outlook and many other email systems are cloud-based software as a service.