News

Encryption essential to BYOD security

The expectations levied on computer security are growing and changing as the bring-your-own-device phenomenon leads to a diversification of employee-used hardware. While employers may encourage personnel to use the same device for work as they do for non-work-related activities, a lack of proactive safety measures means that the these devices can introduce business risk.

According to tech expert Ken Hess in a security trend watch at ZDNet, encryption is one of the most robust defenses against data breaches between different network devices. It's the most widely used risk control measure, he reported, and a direct response to one of the primary concerns of technology professionals: unauthorized access to data and resulting data loss.

Hess wrote that using encryption to ensure the safety of all mobile devices (BYOD and otherwise) is "a major step in the right direction" - but only if used correctly.

"The main argument was that there's data in transit and data at rest, and both need to be encrypted. The problem is that users, managers, and even IT people assume that they are the same. They're not. You can encrypt your data via a VPN that traverses the internet to and from your corporate network, but when the data lands on your device, it's unencrypted - or can be," he wrote.

Mobile malware feeding on BYOD
Another security risk requiring more attention than many companies are currently paying it, wrote Hess, is malware. As the line between devices utilized for work and personal use blurs, hackers have more opportunities to sneak malware into networks.

Hess wrote that mobile apps are frequent targets of malicious code writers. Mobile expert Andreas Baumhof extended the list on FCW to include clicking on shortened Twitter URLs and conducting image searches. He also noted that even legitimate websites may host ads infected by malware, making it important for businesses to choose their marketing partners wisely.

"Personal systems typically lack the malware defenses of managed systems," wrote Baumhof. A company that engages in the BYOD approach without ramping up its protective policies is putting its security in jeopardy by inadvertently linking to a BYOD user's personal network.

"Often, the purpose of a malware program is to gain log-in credentials. That means agencies have to worry about malware on any device that employees or contractors use because their credentials are at risk of being compromised," wrote Baumhof.

Encryption allows more effective management of the BYOD phenomenon. Protect your trusted data in transit with an SSL certificate today.

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +353 1 793 9141
Fax: +27 21 819 2950

Buy now! Try now!