It's a big problem for us. As consultants to numerous small businesses, we are finding more and more companies that like the idea of BYOD because they don't have to spend money for a user's machine. And since they haven't seen any bad things happen because we have the rest pretty well under control, they have their heads in the sand as far as what can happen when all that behind-the-scenes security is not applied to users' devices. Then if they are approached with a project to secure all the user devices, they balk at spending the money. Selling "the lack of a problem" isn't easy. It's bad enough with phones, but with ipads and laptops starting to fall into this mix, it's going to get tougher in a hurry.
Ironically, getting clients to buy into managing phones is sometimes even harder. "It's only a phone". Hmmm... Not quite anymore... *********************** Charlie Kaiser [email protected] Kingman, AZ *********************** -----Original Message----- From: Mike Tavares [mailto:[email protected]] Sent: Thursday, November 01, 2012 3:49 PM To: NT System Admin Issues Subject: Re: 7 shortcuts To Get Your Network Hacked (huh?) My guess is it is going to later rather sooner for most companies. I recently attended a CEO level conference and the question was posed to them if they were taking any precautions now for BYOD’s and of the 30 or so CEO’s that were in the room 2 raised their hands. Kinda scary when it stop and think about it. From: Ziots, Edward <mailto:[email protected]> Sent: Wednesday, October 31, 2012 3:49 AM To: NT System Admin Issues <mailto:[email protected]> Subject: RE: 7 shortcuts To Get Your Network Hacked (huh?) I would say that BYOD is going to creep up to the top of the list sooner than laters for the following reasons. 1) Lack of security specifications and hardening on users devices. ( Android and IOS have many flaws some we are just finding out about) (Just look at jailbreakme.com. 2) Security solutions like ( Mobile-Iron and others) will help mitigate but not totally reduce issues with endpoint devices to an acceptable level. 3) Again these BYOD devices, are more likely and easily stolen or misplaced as compared to corporate devices ( laptop) these days ( abiet, yes laptops are still getting stolen, but usually they are fully encrypted, so going to be hard to get any information of value off them for a while, note: I didn’t say impossible) Z Edward E. Ziots, CISSP, Security +, Network + Security Engineer Lifespan Organization [email protected] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
