Security Think Tank: BYOD requires focus on security risk in 2014

What are the top security issues must businesses address in 2014?

BYOD will continue to grow and, as well as being seen as a perk by existing employees and a budget-saver by IT departments, it will be the de facto requirement for new employees as part of the move towards more flexible working, writes Mike Gillespie.

Given that, according to Ovum, around half of employees use their own devices without their employers knowledge or agreement; and half of businesses who operate BYOD have experienced some kind of data breach (Trend Micro), we in security will have to ramp up our communications on risk and effective mitigation.

Android malware will continue to slurp up data and bank details. The move toward Android products – and the decline of the more traditionally viewed secure BlackBerry – has opened up a world of opportunity for hackers, scammers and other malfeasants. For instance, the Perkle crimeware kit will create further chaos and business devices will need stringent and regular security measures and updates to try to keep one step ahead of malware developments.

Businesses need to use more joined up thinking to leverage their most valuable security asset – their people – in the fight against malicious incursions. 

All of these technology challenges will need boardroom acceptance of risk management and an improvement to communicate security across the whole of the business


Mike Gillespie is director of cyber research and security at the Security Institute.


Read more about security priorities for 2014

This was first published in December 2013

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Endpoint security

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close