Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Nepal protests
  • Nepal Protests Live
  • Vice-presidential elections
  • iPhone 17
  • IND vs PAK cricket
  • Israel-Hamas war
fp-logo
BYOD: Risks And Remedies
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • BYOD: Risks And Remedies

BYOD: Risks And Remedies

FP Archives • February 2, 2017, 23:31:07 IST
Whatsapp Facebook Twitter

The demand to use smart devices in and for the enterprise is rapidly rising. However, IT leaders are still hesitant to cave in with the high risks posed by BYOD phenomenon.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
BYOD: Risks And Remedies

Due to the explosion of smart devices, the term ‘Consumerisation of IT’ is gaining ground in the enterprise IT space. It works both ways - the employees are demanding personal devices to be used for work related purpose and companies are proactively providing smart devices for enhancing employee productivity. However, it comes with a caveat - risks from a multiplicity of mobile devices.

ISACA recently conducted a global as well as India specific survey with IT leaders on online shopping done by employees during work hours using work provided or personal mobile devices.

STORY CONTINUES BELOW THIS AD

The survey helps gauge current attitudes and organisational behaviours related to risk and rewards associated with online shopping and the blurring boundaries between personal and work devices.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

The study is based on October’11 online polling of 298 IT leaders from various organisations in India. The key findings from the survey reveal that more than half of IT professionals in India (56 percent) believe that the risk resulting from employees’ use of personal mobile devices for work activities currently outweighs the benefits.

Majority of IT leaders surveyed believe that employees’ use of personal devices for work activities exposes the company to information security risk. At the same time, almost 41 percent of respondents in India say their enterprises don’t provide security guidance.

Given the fact that the survey was focussed on online shopping, the findings of which are startling, the overarching inference points towards a serious issue in the minds of Indian IT leaders – The risks resulting from the use of personal devices at enterprises outweighs the benefits. This is alarming when India is one of the fastest growing mobile markets in the world and the domestic mobile phone market is increasingly moving towards smart phones.

STORY CONTINUES BELOW THIS AD

Risks Associated With BYOD

As with the rise of the adoption of the smart phone/smart device in India, the demand to use these devices in and for the enterprise has also been rising. However, IT leaders are still hesitant to cave in because of the high risks posed by BYOD phenomenon.

The greatest risk with BYOD is of Advanced Persistent Threat (APT) . While APT has always been a risk lurking in the background, the BYOD will further amplify the possibility of such attacks as the smart devices with high processing power will prove to be a bridge point for the hackers to get an entry into the enterprise network.

![](https://images.firstpost.com/wp-content/uploads/media/images/2011/Nov/img_112702_kartikshahani,countrymanager,india&saarc_190x95.jpg) Kartik Shahani, Country Manager, RSA, explains, “APT is not a direct threat to the organisation. It actually goes through various intermediary steps before its final attack is launched. The hacker (who is a part of a larger group) knows exactly what he wants from the final customer or user. But to get to that organisation he will go through intermediate stages. One of those stages will be the mobile device.”

STORY CONTINUES BELOW THIS AD

An obvious risk will be managing a whole gamut of smart devices with different operating systems, “The challenge is to maintain and monitor the different kinds of devices. The enterprise network is at a grave risk if the IT team fails to lay out appropriate security policies on the respective devices. The task would be to make the security tool fit into securing all kinds of smart devices,” opines Niraj Kapasi, International VP, ISACA.

![](https://images.firstpost.com/wp-content/uploads/media/images/2011/Nov/img_112712_niraj240188_190x95.jpg)

Apart from the device explosion risk, companies will have to take care of the risk emanating from the usage of generally available Internet connections used by the employees for personal use. These connection points are not found as secure as the company’s network. Even if the device is secured when using the company’s network, what if it gets infected from a poorly secured connection?

Shahani observes, “What if the personal device is connecting to other applications and social networking sites, the same device has also got a link into the corporate network, which may not allow any of these social networking sites, etc. In such a case, the BYOD device becomes a bridge point.”

STORY CONTINUES BELOW THIS AD

Managing Risks

The answer lies in real-time and integrated analytics where information exchange sessions are viewed as a whole and not in parts. Shahani specifies, “Real-time analytics will pick the odd sessions. During the instance of an APT attack, at that point in time, the organisation’s IT department will find an anomaly in the traffic pattern.”

He further explains with an example. He says that if the hacker is coming through a valid ID trying to get into an un-patched machine to access some personal information, it may seem to be a usual information exchange session if seen individually, each activity in an isolated action. But the session (in its entirety) is a potential threat and that will be revealed by the integrated analytics solution. The simple reason being, that a valid ID is accessing an un-patched machine and that too to access personal information, is a sign of caution. That’s how APT attacks are thwarted before they inflict any damage.

STORY CONTINUES BELOW THIS AD

To make the process more sustainable, such incidents should also be reported in the governance, risk and compliance module which will allow the organisation to evaluate the level of threat and take preventive action. For example, “If the incident happens once in a year, it might seem to be an aberration however if it happens frequently, the company will have to accordingly make suitable changes in the policies,” suggests Shahani.

The CISO’s office will soon be prompted to make policy changes to fit in the BYOD implications. “Enterprises will have to closely demarcate the rights of the company and the employee on the data and the device,” recommends Kapasi.

It also remains to be seen where the push for BYOD comes from. Many companies in the west have adopted BYOD where the real trigger came from the top management. This trend has moved on to an extent where companies are not supplying any devices, the employees are asked to buy the device of choice and the cost (within certain limits) is reimbursed to them. The source of demand for BYOD holds importance because it will determine how easy or difficult it would be to get approvals for risk management.

STORY CONTINUES BELOW THIS AD
Tags
mobile devices smart devices Risks ISACA Consumerisation BYOD Remedies
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV