3 Risks Associated with Supporting Untrusted BYOD/PC Endpoints
The “Bring-Your-Own Device-or-PC” trend is moving full steam ahead. In fact, according to a May 2013 report by Gartner, the typical knowledge worker now uses four different devices per week to access office systems.
BYOD/PC programs aren’t without risks. By nature, these programs include a multitude of different devices that are typically untrusted or unsecured, and IT is often charged with how to balance end-user demand for these devices with corporate security. Should you choose to implement a BYOD/PC program, you should be aware of all the possibilities, be they good, bad or completely detrimental. The following are three risks associated with a decision to support untrusted BYOD/PC endpoints.
Risk #1: Data Leakage
When it comes to sensitive corporate data sitting on user’s personal devices—especially on the personal laptops being used by both employees and contractors—IT should be very concerned about that fact that sensitive and regulated customer data and company property is being put at a higher degree of risk. The price of recovery from data leakage incidents can be exorbitant and, as a result, many organizations are justifiably concerned about the reduced control that they would have over securing personally owned computers.
Risk #2: Data Segregation
In planning for BYOD/PC, it is essential that enterprise IT investigate the right way to separate and secure corporate information stores on a user’s personal device. Imagine that user were to leave the company, how would IT ensure that all the corporate applications and sensitive corporate data did not leave with that individual?
While organizations are worries about sensitive data loss, they must also consider the end user. A successful BYOD/PC program takes into account users’ privacy, personal file, and apps Data segregation. If not handled correctly, this could lead to data leakage (See Risk #1), upset users, or worse, both.
Risk #3: Supporting Complexity
BYOD/PC programs can raise questions about where IT should draw the line of responsibility when it comes to supporting BYOD/PC devices. How does IT ensure the basic but critical updates of antivirus protection and corporate applications on a myriad BYO machines? How can users, who sometimes take on a “if it ain’t broke, don’t fix it” mentality, be relied on to keep critical applications up to date, especially on their personally owned devices?
These risks can severely impede BYOD/PC implementations. However, the potential benefits that organizations are seeing today—including increased user productivity and both CapEx & OpEx savings—require IT to find a solution to overcome them and successfully secure and manage corporate workspaces on untrusted BYO endpoint devices. That solution? One word: Containers!
Still shaky about BYOD/PC implementation? Download our latest whitepaper and infographic to learn more about how improved BYOD/PC endpoint and security management can accelerate user productivity and cost savings and make sure to check out our latest infographic: 3 Drivers and Barriers to BYOD Investing.