{"id":59758,"date":"2015-01-29T17:18:44","date_gmt":"2015-01-29T22:18:44","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-08-15T14:10:32","modified_gmt":"2022-08-15T18:10:32","slug":"are-firms-ignorant-about-byod-issues","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/are-firms-ignorant-about-byod-issues\/","title":{"rendered":"Are Firms Ignorant About BYOD Issues?"},"content":{"rendered":"<p><strong><a href=\"https:\/\/www.convergent.com\/resources\/stop-putting-your-head-in-the-sand-when-it-comes-to-your-digital-signage-content\/head-in-the-sand\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-117418\" title=\"Are Firms Ignorant About BYOD Issues?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Head-in-the-Sand-osterich-e1625421685965-150x148.jpg?resize=125%2C123&#038;ssl=1\" alt=\"Are Firms Ignorant About BYOD Issues?\" width=\"125\" height=\"123\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Head-in-the-Sand-osterich-e1625421685965.jpg?resize=150%2C148&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Head-in-the-Sand-osterich-e1625421685965.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Head-in-the-Sand-osterich-e1625421685965.jpg?w=360&amp;ssl=1 360w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a>Enterprises are being ignorant towards<\/strong> the issues <strong>BYOD<\/strong> is causing to their business says backup vendor Acronis. <a title=\"James Rawbone, Senior Partner Account Manager EMEA, Enterprise Mobility Solutions at Acronis\" href=\"https:\/\/www.linkedin.com\/pub\/james-rawbone-07712-525940\/3\/8a5\/544\" target=\"_blank\" rel=\"noopener noreferrer\">James Rawbone<\/a>, Senior Partner Account Manager EMEA, Enterprise Mobility Solutions at <a title=\"Acronis\" href=\"http:\/\/www.acronis.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Acronis<\/a>, shared his <a title=\"Enterprises are being ignorant towards the issues BYOD can and are causing to their business&quot;\" href=\"http:\/\/www.itproportal.com\/2013\/09\/14\/enterprises-are-being-ignorant-towards-the-issues-byod-can-and-are-causing-to-their-business-says-acronis\/\" target=\"_blank\" rel=\"noopener noreferrer\">opinions<\/a> with <a title=\"Desire Athow\" href=\"https:\/\/web.archive.org\/web\/20160422084601\/http:\/\/www.itproportal.com\/staff\/desire\/\" target=\"_blank\" rel=\"noopener noreferrer\">Desire Athow<\/a> at <a title=\"ITProPortal\" href=\"http:\/\/www.itproportal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ITProPortal<\/em><\/a> on why and how enterprises are being ignorant towards BYOD issues.<\/p>\n<p><a href=\"https:\/\/www.acronis.com\/en-sg\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-117415\" title=\"Acronis logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_acronis-1.jpg?resize=70%2C69&#038;ssl=1\" alt=\"Acronis logo\" width=\"70\" height=\"69\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_acronis-1.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_acronis-1.jpg?resize=150%2C148&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_acronis-1.jpg?w=320&amp;ssl=1 320w\" sizes=\"auto, (max-width: 70px) 100vw, 70px\" \/><\/a>The <a title=\"Acronis 2013 Global Data Protection Trend Report\" href=\"http:\/\/www.acronis.com\/en-us\/pr\/2013\/07\/17-08-07.html\" target=\"_blank\" rel=\"noopener noreferrer\">Acronis 2013 Global Data Protection Trend Report<\/a> developed by the <strong><a title=\"Ponemon Institute\" href=\"https:\/\/web.archive.org\/web\/20211006230055\/https:\/\/www.ponemon.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Ponemon Institute<\/a><\/strong>\u00a0identified five surprising BYOD trends:<\/p>\n<p>1. There are <strong>big gaps in secure BYOD policies<\/strong> across organizations. The <a title=\"Acronis\" href=\"https:\/\/web.archive.org\/web\/20211212211111\/https:\/\/www.crunchbase.com\/organization\/acronis\" target=\"_blank\" rel=\"noopener noreferrer\">Acronis<\/a> survey found that 60% of businesses have <strong>no personal device policy in place<\/strong>, and those with policies 24% make <strong>exceptions for executives<\/strong>, who are most likely handling the most sensitive corporate data. As a result, these organizations are increasingly vulnerable to data loss and serious compliance issues.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20210512143452\/https:\/\/blog.learningtree.com\/manage-passwords-keepassx\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111593\" title=\"mandate a device password\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords-3-e1625423723430-106x150.jpg?resize=74%2C105&#038;ssl=1\" alt=\"\" width=\"74\" height=\"105\" \/><\/a>2.<strong>Simple security precautions are not being adopted<\/strong>. The survey found only 31% of companies <strong>mandate a device password<\/strong> or key lock on personal devices, and only 21% do <strong>remote device wipes<\/strong> when employees leave the company, drastically increasing the risk for data leakage.<\/p>\n<p>3.Businesses underestimate the <strong>dangers of public clouds<\/strong>. The researchers report that corporate files are commonly shared through third-party cloud storage solutions such as DropBox, but 67% of organizations don&#8217;t have a <strong>policy in place around public clouds<\/strong> and 80% haven&#8217;t trained employees in the correct use of these platforms.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20220505192943\/https:\/\/www.lockhaven.edu\/~dsimanek\/whoops.htm\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-117419\" title=\"compatibility and interoperability are still big obstacles\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/3gears-1.png?resize=111%2C105&#038;ssl=1\" alt=\"compatibility and interoperability are still big obstacles\" width=\"111\" height=\"105\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/3gears-1.png?resize=150%2C143&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/3gears-1.png?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/3gears-1.png?w=481&amp;ssl=1 481w\" sizes=\"auto, (max-width: 111px) 100vw, 111px\" \/><\/a>4.The growth of<strong> <a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a>\u00a0<\/strong>(<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) devices is complicating BYOD security for administrators. 65% of organizations will support <strong>Macs<\/strong> in the next year, and 57% feel <strong>compatibility and interoperability are still big obstacles<\/strong> to getting Macs compliant with their <a title=\"Information technology management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Information_technology_management\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IT infrastructure<\/a>. This puts data stored and shared across the corporate network and on Apple devices at risk.<\/p>\n<p>5.Some organizations are ignoring the benefits of mobile collaboration altogether. More than 30% surveyed actually <strong>forbid personal devices from accessing the network<\/strong>.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-116815\" title=\"\u00a0tight budgets\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Inflation-e1625424158925-129x150.jpg?resize=95%2C110&#038;ssl=1\" alt=\"\u00a0tight budgets\" width=\"95\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Inflation-e1625424158925.jpg?resize=129%2C150&amp;ssl=1 129w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Inflation-e1625424158925.jpg?resize=65%2C75&amp;ssl=1 65w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Inflation-e1625424158925.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/>Mr. Rawbone sees two reasons <strong>organizations are not educating or training their employees<\/strong> on the risks of BYOD. First is <strong>time and money<\/strong>. Most companies have\u00a0tight budgets across the board and in particular within their IT department, as well as their overall staffing. The second excuse for not training their staff is that they are <strong>unaware that their staff is using these solutions<\/strong>, or they are turning a blind eye to the issues effect their corporate data and overall IT infrastructure.<\/p>\n<p>The Acronis\u00a0Senior Partner told <em>ITProPortal<\/em>\u00a0there are <strong>legal and compliance issues<\/strong> associated with BYOD; but generally BYOD can be adapted to each <strong>compliance regulation and rule<\/strong>. The main concern of BYOD is <strong>data protection<\/strong>\u00a0and ensuring that as employees bring devices to-and-from the workplace, confidential corporate data is adequately protected while remaining easily accessible. An important part of data protection, often not addressed by BYOD strategies, includes ensuring that information and records comply with privacy laws like the <a title=\"Health Insurance Portability and Accountability Act\" href=\"http:\/\/en.wikipedia.org\/wiki\/Health_Insurance_Portability_and_Accountability_Act\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Health Insurance Portability and Accountability Act<\/a> (<strong>HIPAA<\/strong>) and <a title=\"Sarbanes-Oxley\" href=\"https:\/\/searchcio.techtarget.com\/definition\/Sarbanes-Oxley-Act\" target=\"_blank\" rel=\"noopener noreferrer\">Sarbanes-Oxley <\/a>(<strong>SOX<\/strong>), as well as specific industry and regional privacy regulations.<\/p>\n<p><a href=\"https:\/\/www.menshealth.com\/technology-gear\/a19517781\/unlocked-phones\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-117421\" title=\"data protection\u00a0\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication-1.png?resize=110%2C110&#038;ssl=1\" alt=\"data protection\u00a0\" width=\"110\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication-1.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication-1.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_authentication-1.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Mr. Rawbone concludes by reminding the author that the important thing every business needs to remember is that <strong>mobile devices can be replaced for a small cost in comparison to having your confidential data stolen<\/strong> and used incorrectly.<\/p>\n<p>Companies need to embrace technological evolution and look at the business benefits of BYOD. Otherwise, he claims they will be facing some serious network and data issues and worst of all potentially facing some legal problems in the coming future.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20180827092418\/http:\/\/memifynetworks.com\/services\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-117422\" title=\"mobile device security policy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Mobile-Device-Management-e1625424806651-150x125.png?resize=110%2C92&#038;ssl=1\" alt=\"mobile device security policy\" width=\"110\" height=\"92\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Mobile-Device-Management-e1625424806651.png?resize=150%2C125&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Mobile-Device-Management-e1625424806651.png?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Mobile-Device-Management-e1625424806651.png?w=177&amp;ssl=1 177w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Creating a <strong>mobile device security policy<\/strong> doesn&#8217;t have to be complicated, but it needs to encompass <strong>devices, data, and files<\/strong>. The article lists a number of simple things organizations should do, like require users to <strong>key-lock their devices with password protection<\/strong>. 68% of those surveyed <strong>u<\/strong><strong>se <a title=\"Virtual private network\" href=\"http:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">VPN<\/a> or secure gateway connections<\/strong> across networks and systems, and 52% use<strong> <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>\u00a0(<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) Active Directory<\/strong> and\/or LDAP. The simplest <strong>place to start<\/strong> is to <strong>use device key-lock and password protection<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20140527004525\/http:\/\/www.cio.com\/article\/753071\/BYOD_Widening_Employee_Employer_Trust_Gap_Survey_Finds\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD Widening Employee-Employer Trust Gap, Survey Finds<\/a> (cio.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Backup vendor Acronis says firms can be being ignorant about BYOD risks many don&#8217;t require passwords or wipe devices after staff leaves<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[3277,420,2116,2167,101,1242,2117,1406,22,1282,82,421,1281,2009],"class_list":["post-59758","post","type-post","status-publish","format-standard","hentry","category-hardware","tag-3277","tag-aapl","tag-acronis","tag-active-directory","tag-apple","tag-byod","tag-data-loss","tag-dropbox","tag-hardware","tag-hipaa","tag-microsoft","tag-msft","tag-ponemon-institute","tag-sox"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=59758"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59758\/revisions"}],"predecessor-version":[{"id":128335,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/59758\/revisions\/128335"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=59758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=59758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=59758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}