yceyusecqxcdd
|

BYOD Can Lead to Data Train Wreck

NO RATINGS
View comments: newest first | oldest first | threaded
Page 1 of 2   Next >   Last >>
mfbertozzi
User Rank
Supply Network Guru
Re: Good points
mfbertozzi   9/22/2012 11:12:51 AM
NO RATINGS

Mr.Roques, you are outlining a very interesting point, especially for CIOs and IT Departments. BYOD is a key topic to address for them and it takes time for reaching the proper trade-off in security and in allowing own devices usage inside companies. Several providers are developing devoted software platforms for allowing devices' control, but once again, it is a critical matter because of privacy rules to accomplish.

Mr. Roques
User Rank
Supply Network Guru
Re: Good points
Mr. Roques   9/21/2012 5:30:59 PM
NO RATINGS

I've thought about what can enterprises do to use BYOD policies but to also have enough data protection. How about having specific "app stores" for those devices? I'm sure Apple is more than willing to create IBM iTunes Store with pre-paid apps that any employee can download for free... those apps should be pre-approved by the IT department.

Also have limits on the other types of apps that users can install. 

Its a BYOD policy but with some limits.

mfbertozzi
User Rank
Supply Network Guru
Re: Good points
mfbertozzi   9/6/2012 9:21:04 AM
NO RATINGS

Well Bolaji, at the end, we could assume a new fascinating scenario is coming. Not to say I have a crystall ball, but I am feeling one of the most important business in the future will be about mobile data storage and in a such way mobile cloud is a good for hitting the target !

Wale Bakare
User Rank
Supply Network Guru
Re: Techinal solution required
Wale Bakare   9/6/2012 8:38:50 AM
NO RATINGS

@PD, yeah more technical orientation might be another strategy but dont you think mobile device users' behaviours and attitude could be another factor to help improving the situation. How many users would be ready and/or have the capability of going through such a high -level of encryption and decryption process on every single access? Though, corporate organization has the responsibility to enusure proactiveness of its access management team 24/7.

Bolaji Ojo
User Rank
Blogger
Re: Good points
Bolaji Ojo   9/6/2012 8:23:44 AM
NO RATINGS

Matteo, I wish I could agree we understand the risks involved. I have two old PCs at home I want to throw out but must confess that I haven't thought much about how to secure the personal data on them. I have copied my hard drives to make sure I can still access the data but haven't spent time on making sure they don't get into the wrong hands. I guess, like many other people, I expect the reclamation centers to do this!

Of course, companies do a better job -- we hope. The reality is, though, that even a supposedly "wiped" hard drive can be salvaged and the data on it restored by IT experts determined to do so. It may cost a bundle but the technology exits.

I plan to open up those two PCs, take out the hard drives and crush them!

prabhakar_deosthali
User Rank
Supply Network Guru
Techinal solution required
prabhakar_deosthali   9/6/2012 7:53:34 AM
NO RATINGS

In my opinion this is a tricky problem which cannot be solved by legal framework, or common sense or by just wiping out the data.

You won't exactly know when your smart device becomes vulnerable to data sealing, physical stealing.

This problem has to be tackled technically.

A way to protect the sensitive official data on your smart device could be to have it sored in encrypted manner on your local storage all the time. To be able to read that data at any time  from your local device you must be required to obtain the decryption key from your authority ( for every access) which will verify your credentials before issuing you the key.

 

This is similar to those one time passwords that the net banking systems issue to you for each on line transaction

 

 

mfbertozzi
User Rank
Supply Network Guru
Re: Good points
mfbertozzi   9/6/2012 7:37:43 AM
NO RATINGS

@WB: I totally agree with the point, because people in a such way, have achieved some knowledge in how to manage security risks for their PC/Laptop, but for mobile devices, risks that are coming (and will come) represent a new horizon to explore and investigate, including for myself.

FLYINGSCOT
User Rank
Supply Network Guru
grey area
FLYINGSCOT   9/6/2012 7:04:38 AM
NO RATINGS

With so many:

- personal gadgets being used for work

- people working flexibly from home offices

- people in 24/7 contact for work support

it is nigh on impossible to keep a clear delineation between work and personal data.    I am sorry I have no idea how to fix it except to say I hope that common sense prevails.

Wale Bakare
User Rank
Supply Network Guru
Re: Good points
Wale Bakare   9/5/2012 6:01:52 PM
NO RATINGS

I like this article, addressed some of contemporary issues regarding security of mobile devices. How about IPv6 auto-configuration and IP renumbering in mobile devices? And more importantly malware/worm works unaware or without the knowledge of mobile users, a big problem. I think users have little or no power to effect the change unless you go for a more or bettter security featured mobile devices, i think.

t.alex
User Rank
Supply Network Guru
Re: Good points
t.alex   9/5/2012 3:59:46 PM
NO RATINGS

And for messaging, we tend to use those like whatsapp all the time. In a way all of our important conversations are already stored on their server.

Page 1 of 2   Next >   Last >>


More Blogs from Frank Cavallaro
As Uber’s robot-trucking division is engulfed by legal troubles, several startups are poised to reinvent the freight business. Starsky Robotics, Embark, and Drive.ai all recently unveiled detailed plans regarding the next phases of their technologies. Which strategy will prove successful?
As we get buried in wrapping paper, what are some new ways to cut the waste?
The downfall of Hanjin was hardly surprising and is forcing some much needed restructuring of the global shipping industry.
Warehouse rents are reaching record heights as inventory is building up across the country. Organizations with a flexible supply chain network are better positioned to combat the issue.
Concerns over manufacturing layoffs cannot be solved by waving tariff wand
Twitter Feed
EBN Online Twitter Feed

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EBN Dialogue / LIVE CHAT
EBN Dialogue enables you to participate in live chats with notable leaders and luminaries. Open to the entire EBN community of electronics supply chain experts, these conversations see ideas shared, comments made, and questions asked and answered in real time. Listed below are upcoming and archived chats. Stay tuned and join in!
Archived Dialogues
Live Chat 01/15: CPOs Re-Shape Their Business Roles
Increasingly chief procurement officers (CPOs) are re-shaping their organizational role to focus on creating results far beyond cost controls. A new IBM survey explores how.
Live Chat 11/12: Examining the Cyberthreat to Supply Chains
The number of cyberattacks is on the rise and hackers are targeting the supply chain. Drew Smith, founder and CEO of InfoArmor, will be on hand to discuss the reality of today's threat landscape and what to do about it.