Cost savingsConvenienceAlready in serviceCost savingsIncreased employee satisfactionIncreased employee productivityCost savings
80% of attacks occur inside a network – behind the firewallMost BYOD devices will be wireless – but must be managed in tandem with wired.A myriad of:devices (phones, tablets, laptops), operating systems (Linux, IP-phone, Windows, iOS, Android), threats (malware, vulnerabilities)inside the network
When do we know if a BYOD is on our network?How do we stop Rogue or Untrusted BYOD access?Is all BYOD Traffic Encrypted Well Enough to Ensure Compliance with PCI-DSS, HIPAA/HITECH, FERPA, GLBA or SOX-404?Are BYODs Harboring Personally Identifiable Information (PII)?Can we Require Whole Device Data Encryption to Protect this very Sensitive/High Risk Data?What if a BYOD gets lost or stolen? Can we (IT Staff) force a remote ‘wipe’ or ‘kill code’ on an employee owned device with corporate data on it?How do we Sync? How do we Backup BYOD?Is there any Good Firewall or Anti-virus/Anti-malware for BYOD?How do we Enforce Policies on BYOD employee-owned equipment?
Firewalls do NOTPrevent malware from infecting a deviceStop the spread of malware within your networkPrevent high risk data, PII, etc from leaving your network
Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
What if the Former Employee was using Personally Owned Mobile Devices?What is your IT Security/Human Resources combined Checklist you go through when an Employee Leaves (voluntarily or involuntarily)?Does the Plan include Mobile Devices and their Company-related Data stored on the device? (Or are You Ready to Crack a Potentially Encrypted Backup you may have Retained?)
In school settings:Students bring devices at their own riskThis means that if they bring a device, they are responsible for keeping it safe and secureThey should not leave their device in a classroom, even if the teacher allows itThe students are responsible for the appropriate use of their personal computing devicesIn government and business settings:Employees bring devices at the organizations’ riskThis means that if you bring a device, The IT STAFF is responsible for ensuring it does not increase risk by way of DATA LEAKAGE, DATA THEFT, HACKING and MALWARE OUTBREAKS
Bottom line: GET THE DEVICE OWNER TO ASSUME SOME LEVEL OF RESPONSIBILITYTechnology affords you time, security
“Consumerization is an unstoppable trend, and most organizations need to demonstrate flexibility and allow employees to use their personal devices for work. But, they also need to establish limits and not permit every device, every operating system and every configuration. Although approaches such as server-based computing and virtualization will also be used to deal with consumerization, NAC provides the flexibility that enterprises need in a BYOD environment, while providing the controls that enable network and security managers to retain control over the network.”
Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.