IT Examiner School, Providence, RI

Defining the BYOD Security Problem vs. Workstations

 Old (Workstations & Mobile):  The “good ole” static password problem

 Cyber attacks: phishing,Trojans, malware, root kits, etc.  Workstations had to be managed, configured, secured, etc.  Data was centralized  New (Mobile):  Multitude of uncontrolled devices  Multitude of unsecured platforms and applications  Several attack vectors  Firewalls irrelevant  Data resides on the endpoints

Defining the BYOD Security Problem (cont.)  Security burden is shifting:  You can’t completely protect the end-point from a determined attacker  As device ownership shifts to the employee, so does the burden for protecting it  Mobile Hotspot:  Will this activity be allowed with BYOD? Opens the “door”  What level of security will be enabled? Should be strongest  Tied to a single user/device or multiple users/devices?  WiFi:  Can open the mobile device for attackers, e.g., Coffee Houses, Airports, Hotels, etc.- open networks  OpenWiFi houldn’t be used, particularly for business use

Made with FlippingBook Annual report