This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Secure look at BYOD

29 August 2012

The rising trend of BYOD (bring your own device) was highlighted in ISACA’s latest survey which found that 39% of the 850-plus interviewees had employers that allow them to use work-supplied mobile devices for personal purposes–while on the other side of the coin, 32% encourage the use of personal devices for business purposes.

Coupled with a clear third (34%) of employers allowing the use of work email addresses for personal communications, researchers found that 50% of respondents have concluded that the risk of using personal mobile devices for work activities outweighs the benefits.

And, with just 21% of employers providing guidance on the secure use of geolocation-enabled smartphones and portable devices, it is clear that the security industry has a number of BYOD-related problems that needs discussing - and resolving.

These key issues - and many others - will be debated at the European Computer Audit, Control and Security/Information Security and Risk Management (EuroCACS/ISRM) conference, 10–12 September 2012. The hot topic at the conference in Munich will be the secure use of mobile devices and BYOD in the workplace.

Over the length of the three-day Munich event, Ramsés Gallego, CISM, CGEIT, International Vice President of ISACA, and a security strategist and evangelist with Quest Software, will look at the topic of securing today’s mobile computing devices, against the backdrop of the user computing environment having changed considerably over the last few years. In his workshop, Gallego will focus on the need to recognise the importance of policy and the types of provisions that need to be included in a mobile computing security policy. He will also look at BYOA (Bring your own application) and IBMD (I’m bringing my device) which are all evolving trends from BYOD.

Steven Ackx, a director of Ascure, a subsidiary of PwC Advisory Services, will cover mobile security - where we are today and where we will be in the future. His workshop will look at solving BYOD anxieties and the need to handle concerns with personal and business data, and how ISACA’s COBIT 5 governance framework can assist in securing mobile devices

According to Gallego, the need to identify the many, disparate types of mobile devices being used, along with their vulnerabilities and risk, is central to developing effective forensics procedures and considerations, when it comes to capturing and preserving evidence obtained from mobile devices. He believes that there is a definite need to better understand the growing market for mobile security and effectively map the available solutions to the existing security problems more.

"To effectively solve BYOD anxieties, enterprises need to address the risk associated with mixing personal and business data on the same device. ISACA's COBIT 5 governance framework goes a long way to assisting professionals in this regard," he added.


Contact Details and Archive...

Print this page | E-mail this page

https://www.fsifm.com/en-gb/
http://edition.pagesuite-professional.co.uk/Launch.aspx?EID=ad48cc47-3ecd-4d64-b5c8-3fa0a72b486d


MOST VIEWED...

View more articles
Article image

Why the Law Says You Need a Nappy Bin Disposal Service

At home, parents are used to disposing of their babies’ used nappies the same way they do any other domestic waste - bagging it up and sticking it in the r...

Benchmarking maintenance

BSRIA has just published this year's operation and maintenance benchmarking report as a guide for building operators to evaluate their performance against ...
Article image

Shaw Contract introduces 'In Stock UK' for fast turnaround projects

As businesses are emerging from lockdown, leading carpet tile and resilient flooring supplier Shaw Contract has launched its ‘In Stock UK’ programme with a...
Article image

EXCLUSIVE Inside Canon UK's environment-friendly building in Reigate

At Canon UK sustainability and FM are inextricably linked. PFM visited the Woodhatch site in Reigate to report on the effectiveness of this approach....
Article image

BIFM becomes IWFM

Following a change of identify, the British Institute of Facilities Management (BIFM) is now known as the Institute of Workplace and Facilities Management ...
Article image

Perimeter protection improvements vital as threat vectors mutate

New whitepaper from Axis explains benefits of integrated security perimeter protection solutions in preventing, rather than delaying, criminal activity, wi...
https://www.uhubglobal.com