IntroductionThe ever-increasing portability and plummeting prices of powerful mobile computing devices have popularized a trend known as Bring your own technology (BYOT) policy, also known as BYOD (bringyour own device), and in some quarters as BYOP (bring your own phone)[1]. While the trend has spread in one form or another over the past two decades, it has seen rapid adoption in recent times (Figure 1), [2, 5], and has had a significant impact on several industries. A recent study conducted by Cisco indicated that 89% of IT departments enable BYOT in some form, and 69% of IT leaders are “positive” about BYOT [36]. A press release issued by Gartner in 2013 predicts a future where BYOT practices are not only permitted, but required for most enterprises. Dell and VMware confirm this relationship [5, 6 and 7]. However, as is common in the IT industry, new trends often bring with them their own security issues. While some companies believe the phenomenon is just a passing fad, there is substantial evidence to the contrary (Figure 2)[3], and therefore organizations must implement effective strategies to identify and mitigate the threats posed by the aforementioned security issues. In the following sections, the author will aim to provide a clear understanding of what comprises the implementation of BYOT policies, their impact on productivity in enterprise environments, and the security issues associated with them. Figure 1. Growth in employee-owned devices. [37]Figure 2 Transition to staff-owned devices in the workplace. [38]What is BYOT?BYOT can be described as the practice...... middle of document......ons-Global.pdf [Accessed December 7, 2013][37]Citrix. IT Organizations Adopt Bring-Your-Own Devices: Global BYO Index 2013 [Online] Available at: http://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/it-organizations- embrace- Bring-Your-Own-Devices.pdf [Accessed December 7, 2013] [38] Mark Bowker. The corporate strategic group. The VMware Mobile Secure Workplace 2013 [Online] Available from: [Accessed December 7, 2013] [39] Kevin Johnson and Tony DeLaGrange. SANS Institute. SANS Survey on Mobility/BYOD Security Policies and Practices 2012 [Online] Available from: http://www.sans.org/reading-room/analysts-program/SANS-survey-mobility [Accessed 7 December 2013] [40] Ponemon . 2013 State of the Endpoint 2012. [Online] Available from: http://www.ponemon.org/local/upload/file/2013%20State%20of%20Endpoint%20Security%20WP_FINAL4.pdf p6. [Accessed December 1 2013]
tags