The security challenges of BYOD

By   ISBuzz Team
Writer , Information Security Buzz | Sep 15, 2013 10:33 pm PST

As businesses embrace BYOD, network engineers have to face up to the security implications of random, roving personal devices connecting to the corporate WLAN and accessing networked applications and data. How can they keep a tight grip on security when network client machines are no longer nailed down? Is it possible to administer the relative chaos of an ever changing population of devices and keep pace with multiple device types and operating systems?

Three aspects to the security challenge

Network access

A tablet or smartphone together with its owner – if they haven’t been approved and registered by the network administration team for full access – may lack the right credentials to log on to the WLAN in a secure and trusted manner. This means they’re likely to use open guest access via a second insecure WLAN. The result is that data flowing to and from the device is open to eavesdropping and interception by a third party – something which may never be discovered unless or until there’s a security breach.

Data leakage

The second issue applies even to devices which have been approved and registered for secure access and which log on through an authorised and encrypted connection.  This is data leakage – transporting secure and restricted documents or other data outside the corporate environment, which may happen through storing corporate data locally on the device itself or through the use of cloud storage solutions like Dropbox.

At such times – and, for example, when employees leave an organisation – it’s vital that a mechanism exists for revoking access privileges given to particular devices. Some devices also offer a remotely triggered erase facility for deleting any stored business data.

Compliance

Finally, engineers need to consider compliance, which is closely linked to security. More and more organisations are having to meet ever-stricter compliance and governance obligations. For  sectors such as finance, insurance and healthcare there are statutory requirements such as the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA) and the Sarbanes-Oxley Act.

Companies may also make their own internal rules, such as IBM banning the use of iCloud and Dropbox. In more extreme situations BYOD may be outlawed altogether, as is now the case with almost 50% of companies in India following fears of information leaks.

Sweeping the impact of BYOD under the carpet risks reducing business efficiency, increasing operating costs and compromising security and confidentiality. Instead BYOD should be – and can be when properly integrated – an asset to the business.

In my next blog I’ll look at ways to maintain security of the wireless environment. You can also find more information in our wireless resource centre

About the Author:

Stéphane Persyn | Fluke Networks | @Flukenetentemea

Stephane Fluke NetworksStéphane Persyn is currently the Fluke Networks Field Marketing Manager for their wireless solutions and network performance solutions for the enterprise. He has over 10 years’ experience in the entire AirMagnet portfolio, from designing, surveying and modelling enterprise WLANs to security, BYOD, WIPS and the 802.11 protocol. He also manages network performance solutions including OptiView XG and OneTouch.

Stéphane joined Fluke Networks from HP where he was an engineer for HP Services for business bustomers.

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

0
Would love your thoughts, please comment.x
()
x