Tag Archive for Android

Six Steps to Avoid BYOD Pitfalls

Six Steps to Avoid BYOD PitfallsIn a recent article on the Forbes CIO Central blog, Dan Woods interviewed Brian Madocks, CEO of PC Helps, a services firm that provides supplemental help desk services for more than 1.6 million end-users. He has been on the front lines as many of its clients have opened up BYOD.

I want an iPadIn the article, Forbes offers advice on how IT departments can respond to users who show up at work and declare: “I want an iPad.”  The author warns that ignoring the corporate use of personal devices (smartphones, iPad’s and other tablets) leave both end-users and the IT department quite unhappy.

Mr. Madocks says the biggest myth is that allowing personal devices to be used for work-related purposes reduces the support burden. At first, this seems strange. If people use devices they know well, shouldn’t they need less help? Also, if an employee is using an iPhone or iPad, won’t their support questions be handled by AppleCare, Apple’s support arm? Mr. Madocks says no. Consumerization reduces some types of support but generates others. Here’s what happens.

ConsumerizationThe number of calls about how to use the device may go down. People know how to use their phones, get on the Internet, and use Facebook. But the number of calls about how to get their corporate email, calendar, and contacts working on phones or tablets may go up. With Apple (AAPL) iPhones and iPads and the fragmented Google (GOOG) Android versions out there it’s even more complicated. The PC Helps CEO reports that users can be frustrated when they go to Apple’s Genius Bar, AppleCare, or to Google for Andriod support and find out that they won’t get any help there because the staff doesn’t know how to support your corporate environment or the applications used within it.

With a multitude of personal devices in your workforce, the support burden may increase and your help desk may not be able to keep up with the unique features and aspects of all the devices. Mr. Madocks concludes that no matter how you allow access to the corporate resources the support burden NEVER disappears.

The support experts from the PC Helps brain-trust, developed a playbook for organizations considering a Bring Your Own Device model:

Don’t just say no to “bring your own technology”: The cat is out of the bag. End users are more productive when they have a vote on the tools they use and their support. PC Helps suggests IT show some leadership and help figure out how to get BYOD (PDF) right so that the company is protected and the users are happy. Recognize that consumerization means giving up some control; learn to live with that.

Listen to the end-users: Create an internal customer advisory group to allow end-users to explain what they want and what they don’t. The article says one of the primary drivers of consumerization is the wish to have work and personal content and capabilities on a single device. Craft a draft set of policies and guidelines based on this input.

Help deskResearch and test your approach: Consider a pilot program before full rollout that includes a mix of key users. Discover the range and types of preferred devices as well as the corporate systems, networks, and applications users will need access to. The blog recommends that you incorporate your findings into the broader rollout plan.

Document and communicate a clear set of policies and guidelines for end-users: Everyone should know what the company policies are for personal devices and where to find them. Explicit review of policies and testing for understanding should be performed from time to time, or as new devices arrive and raise new issues. The policies should set forth:

  • Which devices will be supported.
  • How to request new/more devices,
  • Which apps are authorized,
  • Which apps are forbidden,
  • How to get approval for new apps,
  • What company data is allowed on personal devices,
  • How to get support for devices and applications.

The policies should also answer the following questions:

  • When a device is no longer used for work or an employee leaves, what are their responsibilities to securely deletion corporate data?
  • Where and how will devices be backed up?
  • Who is responsible for backup?
  • Are lock and password-protection required, and how is it managed?
  • Who will provide support?
  • What kind of support questions should be directed to device manufacturers?

ComplexityPlan for a more complex support burden: Allowing personal devices means a world with more devices, which in turn multiplies the knowledge needed from the help desk. There will be more questions on setup, remote access, and use of corporate applications, as well as problems unique to the different devices. There will be more complex support scenarios, such as, how to use Microsoft Office applications on non-PC devices. Be sure you have a support plan and trained people in place.

Don’t rely on device manufacturers for support of your end-users: Manufacturers can handle break/fix and warranty support on products, but they won’t know your corporate policies, processes, nor the core office applications your users work with every day. Apple iPad owners have access to AppleCare and Genius bars, but this is all geared to consumers. AppleCare won’t help with many synchronization issues related to accessing corporate email on the iPad, nor provide urgent support for deadline-related business situations.

a risk to IT’s reputationEnd-users may get the run-around, going to the manufacturer and then to their wireless service provider, to your internal help desk, and to peer support for help, wasting time and productivity on something that could be solved in a single call. Devices for corporate use should have corporate support or they will present a risk to IT’s reputation in the organization.

Prepare your help desk for the task: The help desk in a BYOD IT environment is a different type of organization, one that must be able to respond to the unexpected. Mixed device environments require specialization and expertise, as well as ongoing training and skill-building. Your existing help desk staff may need to be retrained, expanded, or supplemented.

In the end, Mr. Madocks reports that the firms PC Helps assists in consumerization don’t regret their decision. “While consumerization creates complexity for support … The company’s workforce is happier and more productive, and the reputation of IT as a supporter of the business is greatly enhanced.” The end result is generally happier users and happier IT, but there are complications.

rb-

It is my experience that most people who push consumer devices into the enterprise, don’t have a plan. They want their iPads, for valid or not so valid reasons. Some staff seemed surprised when they could not print to the enterprise printer on the enterprise network with the iPad they just brought in.

I place a great deal of the blame at the feet of Apple. I have had Apple engineers look me straight in the face and tell me that iPads are consumer devices and not designed for the enterprise and that Apple does not intend to fix it.

They do not use standard protocols and BYOD proponents don’t even know what Bonjour is, let alone the limitations of Bonjour.

http://blogs.forbes.com/ciocentral/2011/02/07/i-want-my-ipad-avoiding-it-consumerization-pitfalls/
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Smartphone Screen Kill Germs

Smartphone Screen Kill GermsCell phones are filthy. I wrote about portable petri dishes back in November 2012. CNET found that 75% of Americans use their mobile phones in the bathroom to make calls, text, and play with apps. Your mobile phone carries more germs than a toilet seat. There is speculation that they have even spread Ebola. Now, thankfully, Corning has your back.

Gorilla Glass kills germs all by itselfEric Limernewest revision of Gorilla Glass is more resilient and kills pesky germs all by itself. Gorilla Glass covers 1.5 billion mobile phones worldwide, including all Apple (AAPL) iPhones.

Corning discussed its upcoming display tech at the MIT Mobile Technology Summit. The antimicrobial coating on the new glass can kill virtually all nasty microbes on the screen’s surface over a course of two hours. It’s not instantaneous, but it’s way better than having a pocket petri dish, Mr. Limer observed.

Signe Brewster at GigaOM wrote that during the presentation, Corning senior vice president Jeff Evenson reported that the company is working on glass that kills viruses and germs — even the drug-resistant variety. GigaOM says that the VP noted a study that found smartphones carry more microbes than the average public toilet. He displayed how the glass kills microbes over time with slides depicting them as bright green dots. After two hours, the antimicrobial glass had a million times fewer bacteria than standard phone glass. Corning’s Evenson said

“You’re eating your sandwich at your desk. Your smartphone rings. You answer it. You complete the call, put your smartphone down and you go back to eating your sandwich with the same hand. Which piece of glass do you want on that device?”

Gizmodo reports that Corning said the antimicrobial displays will be available sometime in the next two years.

Corning antimicrobial glass kills germs

And that’s not all, either. GigaOM’s Brewster also reports that Corning is developing a new transparency treatment that will make the next revision of Gorilla Glass tens of times more transparent than purified water. This should result in seeing your phone in broad daylight is about to get way easier.

 rb-

Until Corning releases Gorilla Glass 3, washing your hands is a good idea, and licking your iPhone screen is probably a bad idea. In order to clean your iPhone, Apple recommends:

Wash your handsTo clean iPhone, unplug all cables and turn off iPhone (press and hold the Sleep/Wake button, and then slide the onscreen slider). Use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean your iPhone. The front and back glass surfaces have an oleophobic coating. Simply wipe these surfaces with a soft, lint-free cloth to remove fingerprints. This coating’s ability to repel oil will diminish over time with normal usage, and rubbing the screen with an abrasive material will further diminish its effect and may scratch the glass.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

F-Secure Top Security Predictions for 2013

F-Secure Top Security Predictions for 2013As the new year looms, all kinds of firms start making predictions, mostly to boost their sales next year, I will be looking at a number of firm’s predictions for next year, a let’s see how smart they are this time next year. Here are the top security predictions for 2013 from Finland-based F-Secure Labs shared with Help Net Security.

ITU WCIT in Dubai could mean the end of the Internet1. The end of the Internet as we know it? – Secure Labs predicts that the ITU WCIT in Dubai could mean the end of the Internet (which I covered here and here). Sean Sullivan, Security Advisor at F-Secure Labs says that the World Conference on International Telecommunications could have a major impact on the Internet as we know it. “The Internet could break up into a series of smaller Internets,” Sullivan says. “Or it may start to be funded differently, with big content providers like Facebook and Google/YouTube having to pay taxes for the content they deliver.

rb- WCIT has concluded with the U.S. and most of Europe refusing to sign the treaty due to language backed by Russia and China that could have large-ranging impacts on Internet freedom.

2. Leaks will reveal more government-sponsored espionage tools – “It’s clear from past leaks about Stuxnet, Flame, and Gauss that the cyber arms race is well underway,” says Mikko Hypponen, Chief Research Officer at F-Secure Labs. While we may not always be aware of nation-states’ covert cyber operations, we can expect that governments are more and more involved in such activity.

mobile malware will increase3. Commoditization of mobile malware will increase – The Google (GOOG) Android operating system has solidified in a way that previous mobile operating systems haven’t, extending from phones to tablets to TVs to specialized versions of tablets. The more ubiquitous it becomes, “the easier to build malware on top of it and the more opportunities for criminals to innovate business-wise,” Sullivan says. Mobile malware will become more commoditized, with cyber-criminals building toolkits that can be purchased and used by other criminals without real hacking skills. In other words, malware as a service, for Android.

4. Another malware outbreak will hit the Mac world – First it was Mac Defender and then Flashback that attacked Apple.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

The End of Microsoft?

The End of Microsoft?The BusinessInsider published some awesome charts from Horace Dediu of Asymco that shows the collapse of Microsoft (MSFT) and Intel’s (INTC) monopoly in personal computing. Henry Blodget says the chart shows how Google‘s (GOOG) Android and Apple (AAPL) have successfully eaten into Wintel‘s market share. Is it the end of Microsoft?

BI - Share of Personal Computing Platforms

Blodget included a chart from BI Intelligence showing the unit sales of PCs, smartphones, and tablets.

BI - Global Internet Device Shipmetns

rb-

This does not say that Microsoft is going to collapse. It still has a number of successful businesses. It’s just not going to run the world like it once did according to the article. So this is not the end of Microsoft.

Related articles
  • Wintel and the Disappearing PC World (beta.fool.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

SmartPhone Zombie Apocalypse

SmartPhone Zombie ApocalypseIf you have a smartphone, online criminals may soon have your number. Smartphone malware is getting increasingly sophisticated, and MIT‘s Technology Review reports that a security researcher has created software that turns a smartphone into a “zombie” that can be controlled remotely. The blog says Georgia Weidman created the program, which controls a Google (GOOG) Android phone via short message service (SMS) to bring about a smartphone zombie apocalypse.

malicious software on mobile phonesOnce only theoretical, real-world cell-phone viruses are becoming more common. The article reports the most famous was a scam in Russia that tricked users into installing malicious software on Android phones and using the SMS functionality to send messages to a number that charged a premium fee. In late 2010, a Chinese virus for Android devices stole personal data according to the article.

Botnets have become a staple of Internet crime. They can be used to attack other systems, host attack tools, send spam, or just steal data. The blog says this type of attack has been rare with mobile devices, but that seems to be changing. “We have been taking down Internet botnets for years now, but there is not as much understanding [of telecom networking],” Ms. Weidman says. “I definitely see criminals going more and more toward using the telco’s network.”

zombie nodes of a botnetTR explains that Ms. Weidman’s program is one of the first known to turn smartphones into zombie nodes of a botnet. Her attack works like this: After infecting a phone with a rootkit, she uses that phone to send spam text messages, takes part in a denial-of-service, or degrade the communications of the phone—all without the user knowing. The techniques apply to any smartphone, Weidman says.

Today’s smartphones have multiple layers of defense. For one, they can block malicious applications. They also have managed channels, such as the Apple (AAPL) App Store and Google’s Android Marketplace, for applications.

botnet controlAs a result, Weidman says, infecting a smartphone is not easy. “The hurdle with any malware is infecting the phone,” she told Technology Review, noting that the methods used by cybercriminals usually do not work. “More of what you see of malware is people downloading applications for their phone that are infected,” she says.

The problem of cyber-criminals targeting consumers’ phones will only get worse Kevin Mahaffey, chief technology officer of mobile-security startup Lookout told the author. Because the control of phones is so easy to turn into cash via premium text messages, criminals will be drawn to attack the devices.

Lookout logo“I always tend to look at the economics of the problem to ask myself whether it will continue in the future,” the CTO explained. “And because there is an incentive for attackers to compromise mobile phones, and the cost of compromising is not that high, that says it will become more prevalent in the future.”

Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users. When the attacker does it using malicious software, the user has little chance of detecting it, says Weidman.

smartphone botnet zombie“When I infected a phone in my botnet—my lab botnet—with malware, the smartphone would receive a message through SMS and I would check to see if it has botnet instructions in it,” she says. “If it does, it would perform the functionality requests, and then it would swallow the message, so the user does not know that there was a message at all.”

While phones do not have the computing power of more traditional computers, they are hefty enough to handle many of the tasks that cyber-criminals desire, she says. She adds that the sheer number of smartphones means that any botnet could be “a real threat” to create a smartphone zombie apocalypse.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.