• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Cloud Computing   »   HR could play leading part in BYOD success

HR could play leading part in BYOD success

  • Posted on:June 12, 2013
  • Posted in:Cloud Computing, Compliance & Regulations, Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

It's a trying time to be an IT director tasked with navigating a company's move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE Conference and Expo had many professionals saying that BYOD could be considered more of a "people problem" than a strictly technical concern. Many users simply ignore policies that are put in place or work around them to make things better for themselves. Faas said his view that IT needs the help of HR and other corporate stakeholders to have a reasonable BYOD program has really come to light.

"In the organizations that have succeeded with consumerization initiatives, the key lesson offered during the various sessions and workshops was almost universal — IT needs to spend time with users, and understand their jobs and processes and the tools that they are choosing to use," he wrote. "IT must explain why it's deploying new tools in language that users can understand (and increasingly, users can understand many of the technical explanations in IT's own language and jargon)."

IT professionals also need to understand not only which tools are being used and desired but why they are important. There must be more collaboration between HR and IT leaders to ensure that all employees are following the correct protocol in using their devices as securely as possible.

InfoWorld's Dan Tynan wrote that those who want to use their own devices will likely do so with or without managerial consent, so proactive BYOD security steps should be taken. Tsion Gonen, chief strategy officer for security firm SafeNet, said the policy shouldn't be too complex. Start the guide out by saying is approved for office use as long as it is not jailbroken or rootkeyed, but after that the policy should just state basics. Encryption, enforcing passwords and remote wipes should all be written in and clearly communicated with employees who wish to use their own devices.

HR Daily Advisor spoke with attorney Brian Jackson, who said organizations must review (and likely update) their electronic monitoring policy. Businesses must also always figure out who will be paying for what in a BYOD system, stress that employees must welcome security controls on their devices and have penalties in place for misuse of BYOD to avoid any data leaks. 

Consumerization News from SimplySecurity.com by Trend Micro.

Related posts:

  1. Accepting BYOD better for security
  2. Attention to application security in BYOD boosts productivity, safety
  3. Apply lessons learned from Wi-Fi to help BYOD
  4. US Army having some troubles with BYOD

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.