It's a big problem for us. As consultants to numerous small businesses, we are 
finding more and more companies that like the idea of BYOD because they don't 
have to spend money for a user's machine. And since they haven't seen any bad 
things happen because we have the rest pretty well under control, they have 
their heads in the sand as far as what can happen when all that 
behind-the-scenes security is not applied to users' devices. Then if they are 
approached with a project to secure all the user devices, they balk at spending 
the money. Selling "the lack of a problem" isn't easy.
It's bad enough with phones, but with ipads and laptops starting to fall into 
this mix, it's going to get tougher in a hurry.

Ironically, getting clients to buy into managing phones is sometimes even 
harder. "It's only a phone". Hmmm... Not quite anymore...

***********************
Charlie Kaiser
[email protected]
Kingman, AZ
***********************


-----Original Message-----
From: Mike Tavares [mailto:[email protected]] 
Sent: Thursday, November 01, 2012 3:49 PM
To: NT System Admin Issues
Subject: Re: 7 shortcuts To Get Your Network Hacked (huh?)

My guess is it is going to later rather sooner for most companies.  I recently 
attended a CEO level conference and the question was posed to them if they were 
taking any precautions now for BYOD’s and of the 30 or so CEO’s that were in 
the room 2 raised their hands.  Kinda scary when it stop and think about it.
 
 
 
From: Ziots, Edward <mailto:[email protected]>  
Sent: Wednesday, October 31, 2012 3:49 AM
To: NT System Admin Issues <mailto:[email protected]>  
Subject: RE: 7 shortcuts To Get Your Network Hacked (huh?)
 

I would say that BYOD is going to creep up to the top of the list sooner than 
laters for the following reasons. 

 

1)      Lack of security specifications and hardening on users devices. ( 
Android and IOS have many flaws some we are just finding out about) (Just look 
at jailbreakme.com. 

2)      Security solutions like ( Mobile-Iron and others) will help mitigate 
but not totally reduce issues with endpoint devices to an acceptable level. 

3)      Again these BYOD devices, are more likely and easily stolen or 
misplaced as compared to corporate devices ( laptop) these days ( abiet, yes 
laptops are still getting stolen, but usually they are fully encrypted, so 
going to be hard to get any information of value off them for a while, note: I 
didn’t say impossible)

 

Z

 

Edward E. Ziots, CISSP, Security +, Network +

Security Engineer

Lifespan Organization

[email protected]

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to